On 3/27/19 2:22 PM, Al Payne wrote:
> On Wed, Mar 27, 2019 at 09:09:37AM -0700, Eduardo Bustamante wrote:
>> On Wed, Mar 27, 2019 at 8:17 AM Jason Hall wrote:
>> (...)
>>> The point is, their is a legitimate use for sourcing Binary Shell
>>> Scripts (...)
>>
>> Is it really a legitimate use? If yo
On Wed, Mar 27, 2019 at 09:09:37AM -0700, Eduardo Bustamante wrote:
> On Wed, Mar 27, 2019 at 8:17 AM Jason Hall wrote:
> (...)
> > The point is, their is a legitimate use for sourcing Binary Shell
> > Scripts (...)
>
> Is it really a legitimate use? If you're doing it for "security" (by
> obscur
On Wed, Mar 27, 2019 at 8:17 AM Jason Hall wrote:
(...)
> The point is, their is a legitimate use for sourcing Binary Shell
> Scripts (...)
Is it really a legitimate use? If you're doing it for "security" (by
obscurity I guess?), it's easy to defeat.
> and BASH as is, won't let you do this. May
I was provided a shell script that is self decrypting, self unzipping,
and checks if the file has been tampered with using an encrypted MD5
sum. The file uses the filename, command line parameters and some
trial data to create the encryption key in a shell variable which it
uses to decrypt an embe