1 / 12

Website Protection: Convert Page Source to Human-Unreadable Code

Utilize various approaches to obfuscate page source code for website protection. Methods include using HTML, JavaScript, hexadecimal values, escape/unescape functions, and algorithms to make content unreadable. Explore examples and resources for effective code concealment.

ernie
Download Presentation

Website Protection: Convert Page Source to Human-Unreadable Code

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Website protection Convert page source to a human-unreadable code

  2. Different approaches • Using HTML • Using Javascript • Using hexadecimal values • Using “escape/unescape” • Using an algorithm

  3. Using HTML only • In HTML, all symbols can be expressed using ASCII. • E.g. • ‘a’ = a

  4. Using Javascript • Using hexadecimal values • Using “escape/unescape” • Using an algorithm

  5. 1. Converting text into hexadec. • Convert into hexadecimal. • ‘Hello World!’= ‘%48%65%6c%6c%6f%20%57%6f%72%6c%64%21’

  6. 1. Display text in hexadec. • Display the hexadecimal values using unescape

  7. 2. Using escape/unescape • Convert text into url friendly string using escape • Result: Hello World = Hello%20World%21 • Convert it back using unescape

  8. 3. Using an algorithm • In this algorithm we are using XOR cipher. • 5 xor 6 = 3 • 5 xor 3 = 6 • 3 xor 6 = 5 • Given two numbers, we will always get third.

  9. 3. Using an algorithm • To either encrypt or decrypt, use the same method

  10. 3. Using an algorithm

  11. 3. Using an algorithm • See this code in action: • http://editor.clizware.net/?id=6

  12. Thank you • This presentation is based on an article written by Artem Los. • See the article • http://blog.clizware.net/all/329

More Related