Skip to content

Instantly share code, notes, and snippets.

@theseanl
theseanl / README.md
Last active September 23, 2017 20:12
Obfuscated code found in exashare. Possible working example of canvas fingerprinting.

This javascirpt code was from http://exashare.com/48fbxtebg0a1, originally reported at https://forum.adguard.com/index.php?threads/exashare-com.15270/

I added #%#Object.defineProperty(window, 'admvpu', { set: function(){ throw new TypeError; } }); to sabotage this script which generates obnoxious popups without looking at its actual content, but this script had looked particularly suspicious, so I tried de-obfuscating it.

It turned out that this script is from "admaven" and doing "canvas fingerprinting". They look like absorbing every possible information from the user and use it to target ads :/

This is the first working example of canvas fingerprinting used by real ad network I've ever seen. Sharing as mentioned here. I hope this helps in developing Stealth mode.

By the way, they (http://ad-maven.com/) seems to be pretty new and bo