Name | Modified | Size | Downloads / Week |
---|---|---|---|
ReadMe.txt | 2011-07-22 | 535 Bytes | |
targetver.h | 2011-07-22 | 765 Bytes | |
stdafx.cpp | 2011-07-22 | 293 Bytes | |
stdafx.h | 2011-07-22 | 320 Bytes | |
un.clk.vcproj | 2011-07-22 | 4.2 kB | |
un.clk.cpp | 2011-07-22 | 905 Bytes | |
un.clk.exe | 2011-07-22 | 7.7 kB | |
Totals: 7 Items | 14.7 kB | 0 |
Un.clk If you get a file that has been "cloaked" by a WatchGuard firewall it will have an extension .clk and start with the text: This file has been cloaked. The original message may be retrieved by XORing each byte with 42. filename: content-type: text/html ---- Followed by the "cloaked" data. Uncloaking is trivial but I couldn't find a utility to do it. To run the app just provide the nale of the file to "uncloak". The output file will be the same filename with .out appended to the end. That's it.