What sort of ASP code is this?

Posted on 2006-03-30
Last Modified: 2008-02-01
I have inherited the ASP file below but it looks like it's encrypted or compiled or something.

Can anybody tell me what it is and how to deal with it?

<!--#Include Virtual="includes/"-->
<%#@~^xB0AAA==@#@&dW      m}w+      CCND~JU+C.1tPr~[,/?bOn1m:~OD;n@#@&@#@&i]+kwGUk+R      .bYn`r@!(D@
* etc, etc... *
o@#@&@#@&Bi./;WxDnUY8R;VG/n@#@&B7?OPM//G      Y+UO8PxPgGDtr      o@#@&d@#@&i3Vk+@#@&iB~9b/w^CX,?+m.^t,sKDh@#@&+w4IAA==^#~@%>
      Use the form below to search through our online database of over 3000 products. Simply select the field (eg Author, ISBN, Description, Title etc) that you would like to search on by click on the drop-down box to the left, then enter your specific data (eg: 'Pilates') and then press the <b>Search!</b> button.
      <form action='search.asp' method='post'>
      <select name='cat'>
      <option value='D'>Description</option>
      <option value='P'>Product Code</option>
      <option value='T'>Product Title</option>
      <option value='I'>ISBN</option>
      <option value='A'>Author</option>
      <input name='GO' value='true' type='hidden'>
      <input name='val' type='text' maxlength=50 size=25>
      <input type='submit' value='Search!' name='search'>

*etc, etc...*
nXY~k1G      /~SkDtPmwask1l8VPsr      3/@#@&@#@&ds!U^YbW      ^YbWx@#@&N7ABAA==^#~@%>
Question by:slamhound
    LVL 28

    Expert Comment

    Looks like Microsoft Script Encoder, although this code does not decode in
    LVL 25

    Accepted Solution

    microsoft also came up with the de-encoder with the scrypt encoder, they just don't post it on there website for oblivious reasons.

    Best bet would be to do a search for it on google or yahoo, the download the file.  I believe it's called descrenc.exe

    try these links out

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Suggested Solutions

    Title # Comments Views Activity
    Summer note focus on load 19 129
    ASP equivalent to Windows findstr 3 49
    replace quotes with UTF-8 character 38 58
    XML Parsing Classic ASP 5 25
    I would like to start this tip/trick by saying Thank You, to all who said that this could not be done, as it forced me to make sure that it could be accomplished. :) To start, I want to make sure everyone understands the importance of utilizing p…
    Have you ever needed to get an ASP script to wait for a while? I have, just to let something else happen. Or in my case, to allow other stuff to happen while I was murdering my MySQL database with an update. The Original Issue This was written…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    758 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now