Author Topic: URL endoder decoder blocked by Malwarebytes extension...  (Read 901 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast √úberevangelist
  • Probably Bot
  • *****
  • Posts: 33667
  • malware fighter
URL endoder decoder blocked by Malwarebytes extension...
« on: September 22, 2018, 03:46:24 PM »
As a user of Bobby Spasic's Malzilla, I followed the read here:

Then tried to decode that particular code example found in the txt,
after which the site I performed that encoding decoding from was blocked by MalwareBytres extension
(very much like that extension's protection  ;)).

Code did not have a particular payload, still was potent enough in it's outlay  to trigger an alarm,
as hxtp:// was alerted producing suspicious activity.

So users here are advised not to do what I have done, as code should be at once nullified!

A way to do it is run the decoded code inside malzilla as that has ample sandboxing to study such examples.
Mainly use for my flaw of the Malzilla browser is dissecting redirects.
I use my enhanced special version with my own additions, since the latest version that came out during 2013.

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!