2010-02-12 03:20:53 +03:00
|
|
|
Due to the anti-virus positive detection of shell scripts stored inside
|
|
|
|
this folder, we needed to somehow circumvent this. As from the plain
|
|
|
|
sqlmap users perspective nothing has to be done prior to their usage by
|
|
|
|
sqlmap, but if you want to have access to their original source code use
|
|
|
|
the decrypt functionality of the ../extra/cloak/cloak.py utility.
|
2010-01-27 16:58:28 +03:00
|
|
|
|
2010-01-27 19:05:32 +03:00
|
|
|
To prepare the original scripts to the cloaked form use this command:
|
2010-01-27 16:58:28 +03:00
|
|
|
find backdoor.* uploader.* -type f -exec python ../extra/cloak/cloak.py -i '{}' \;
|
|
|
|
|
|
|
|
To get back them into the original form use this:
|
2010-02-12 03:20:53 +03:00
|
|
|
find backdoor.*_ uploader.*_ -type f -exec python ../extra/cloak/cloak.py -d -i '{}' \;
|