1 # Contributor: fnord0 < fnord0 AT riseup DOT net >
6 pkgdesc="SQL Injection takeover tool"
8 url="http://code.google.com/p/mysqloit/"
10 depends=('python2' 'metasploit')
11 source="http://mysqloit.googlecode.com/files/${pkgname}v${pkgver}.tar"
12 md5sums='b1327143a02dd7ba30097673c26b84f6'
13 sha1sums='30c8f240f1ead6ad14e31b0d5700265882b1aed9'
17 mkdir -p ${pkgdir}/usr/{bin,share} || return 1
18 mkdir ${pkgdir}/usr/share/${pkgname} || return 1
19 cd ${srcdir}/${pkgname}v${pkgver}
20 mv * ${pkgdir}/usr/share/${pkgname} || return 1
22 cd ${pkgdir}/usr/share/${_svnmod}
23 grep -rl python ${pkgdir}/usr/share/${pkgname}/ | xargs sed -i 's|python|python2|g' || return 1
24 cd ${pkgdir}/usr/share/${pkgname}
25 #check if metasploit-svn or metasploit stable is installed (metasploit-svn takes presidence)
26 if [ -d /usr/src/metasploit ]; then
27 sed -i 's|/usr/local/metasploit|/usr/src/metasploit|g' conf.py || return 1
29 sed -i 's|/usr/local/metasploit|/opt/metasploit|g' conf.py || return 1
33 echo "#!/bin/sh" > ${pkgdir}/usr/bin/mysqloit || return 1
34 echo "cd /usr/share/mysqloit" >> ${pkgdir}/usr/bin/mysqloit || return 1
35 echo "if test -z \"\$1\"" >> ${pkgdir}/usr/bin/mysqloit || return 1
36 echo "then" >> ${pkgdir}/usr/bin/mysqloit || return 1
37 echo "python2 ./mysqloit.py -h" >> ${pkgdir}/usr/bin/mysqloit || return 1
38 echo "else" >> ${pkgdir}/usr/bin/mysqloit || return 1
39 echo "python2 ./mysqloit.py \"\$@\"" >> ${pkgdir}/usr/bin/mysqloit || return 1
40 echo "fi" >> ${pkgdir}/usr/bin/mysqloit || return 1
41 echo "cd -" >> ${pkgdir}/usr/bin/mysqloit || return 1
42 chmod +x ${pkgdir}/usr/bin/mysqloit || return 1
46 echo -e "\e[1;31m[\e[0m\e[1;34m*\e[0m\e[1;31m]\e[0m \e[1;31mrun '\e[0m\e[1;34m/usr/bin/mysqloit -h\e[0m\e[1;31m' for an explanation of mysqloit startup options\e[0m"
47 echo -e "\e[1;34m>>>\e[0m \e[1;31mmysqloit project homepage @ \e[0m\e[1;32mhttp://code.google.com/p/mysqloit\e[0m"