[SANS ISC] Anti-Debugging JavaScript Techniques

I published the following diary on isc.sans.edu: “Anti-Debugging JavaScript Techniques“:

For developers who write malicious programs, it’s important to make their code not easy to be read and executed in a sandbox. Like most languages, there are many ways to make the life of malware analysts mode difficult (or more exciting, depending on the side of the table you’re sitting ;-).

Besides being an extremely permissive language with its syntax and making it easy to obfuscate, JavaScript can also implement anti-debugging techniques. A well-known technique is based on the method arguments.callee(). This method allows a function to refer to its own body… [Read more]

[The post [SANS ISC] Anti-Debugging JavaScript Techniques has been first published on /dev/random]

Article Link: https://blog.rootshell.be/2020/06/11/sans-isc-anti-debugging-javascript-techniques/