Reverse Engineering (Offensive) JavaScript Analysis: JSDetox
I'm stuck at below two questions
Q6: Which variable does the initial script try to return?
Q8: The exploit kit contains a large block of hex encoded shellcode stored in a variable. This shellcode is also XOR encoded. What is the single byte xor key? (In the format 0xNN e.g. 0x11.)
So far I downloaded the HTTP objects via Wireshark, extracted the script to JSDetox then decoded base64 strings which resolves to other 2 scripts. With these steps I was able to answer other questions but I can't go any further, any guidance?
Thanks in advance
I was able to complete the lab however I think lab needs some improvement
For Q3, you need to look into the obfuscated code, before applying applying any deobfuscating steps
For Q8, the data analyze tool in the lab does not work. Use CyberChef or something else, it is very misleading if you assume it works and you are missing something.