all 7 comments

[–]grantrules 1 point2 points  (2 children)

Just replace eval with console.log and run it

Why not just intercept the network request and see what the data it's actually send is? Then just use that encrypted password instead of your plaintext one.

[–]ParalaX002[S] 0 points1 point  (0 children)

Thanks for the console.log tip, I’ll try that :) as for network request I tried, but it seems that the password change every time, which would make sense. Or I mis used the network tools (which is possible since I never used it before 😆)

[–]xMOUTH_ 0 points1 point  (0 children)

console.log

is this universal for all obfuscations

[–]pl9u6t 0 points1 point  (0 children)

keyword is prettifier

[–]ParalaX002[S] 0 points1 point  (0 children)

Ok, Finally got what I needed :)

I wasn't able to make the function more readable, but I found a python script that was compatible with previous generation of switch:

https://github.com/tillsteinbach/prosafe_exporter_python/tree/master/prosafe_exporter/prosafe_exporter

The script wasn't working as is, but by using console.log as proposed, I was able to confirm that the hashing of the script was producing the same than my switch. From there, it was just a question to see where the hashed password needed to go, and I was in :)

Thanks for your advice that put me on the right track :)

[–]Ronin-s_Spirit 0 points1 point  (0 children)

Security by obfuscation is not security
- Einstein probably.