(Note that that breaks direct eval - a proper solution would have to 
involve a debugger. E.g., why not use Firebug's Script panel?)

Den fredagen den 13:e juni 2014 kl. 15:23:43 UTC+2 skrev Jan Honza Odvarko:
>
> Perhaps you could overwrite the native eval() and track calls throug your 
> custom eval implementation?
>
> Something like:
>
> var proxied = eval;
> eval = function() { alert("ha"); return proxied.apply(this, arguments);};
> eval(7);
>
> Honza
>
> On Friday, June 13, 2014 1:46:27 PM UTC+2, Akshay Darekar wrote:
>>
>> I am a python developer. i was find out malicious or Obfuscation 
>> javascript this are run time executing, when i execute in my brawser this 
>> are infected to my desktop. i want to trace what in the eval function are 
>> executing. this javascript are encoded format that are run time encoding 
>> self and infecting to machine. anybody have idea about how to catch this 
>> value / string.
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Firebug" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/firebug.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/firebug/25710712-920a-44c7-a96f-2cc4809d376c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to