Sign in to Community
Sign in to view all badges
I'm looking at the obfuscated code from Adobe Target (At.js) . What I'm trying to pin-point is where it initially reads the response with the json structure. I started on this line (Line #4697):
$p = ["/m2/", Rp, "/mbox/json"].join(As),
And started to follow it back but didn't have much luck! Below is a sample response:
Below is the location of the At.js file (beautified).
I found out, it is the Vo(t) function.