Source: cirosantilli/cia-2010-covert-communication-websites/iraniangoals-com-javascript-reverse-engineering
= iraniangoals.com JavaScript reverse engineering
<JavaScript> file: https://web.archive.org/web/20110202091909/http://iraniangoals.com/journal.js
Some <reverse engineering> was done at: https://twitter.com/hackerfantastic/status/1575505438111571969?lang=en[].
Notably, the password is hardcoded and its <hash> is stored in the JavaScript itself. The result is then submitted back via a POST request to `/cgi-bin/goal.cgi`.
TODO: how is the SHA calculated? Appears to be manual.