sqlmap/shell
2011-06-06 18:16:45 +00:00
..
backdoor.asp_
backdoor.aspx_
backdoor.jsp_
backdoor.php_ this is totally unnecessary but one more byte is squeezed out 2011-06-06 18:16:45 +00:00
README.txt
runcmd.exe_
stager.asp_
stager.aspx_
stager.jsp_
stager.php_

Due to the anti-virus positive detection of shell scripts stored inside
this folder, we needed to somehow circumvent this. As from the plain
sqlmap users perspective nothing has to be done prior to their usage by
sqlmap, but if you want to have access to their original source code use
the decrypt functionality of the ../extra/cloak/cloak.py utility.

To prepare the original scripts to the cloaked form use this command:
find backdoor.* stager.* -type f -exec python ../extra/cloak/cloak.py -i '{}' \;

To get back them into the original form use this:
find backdoor.*_ stager.*_ -type f -exec python ../extra/cloak/cloak.py -d -i '{}' \;