This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP ZSC Tool Project"
From OWASP
(→DISCLAIMER) |
|||
(21 intermediate revisions by 3 users not shown) | |||
Line 20: | Line 20: | ||
<span title="Seed on Newsvine">[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&u={{fullurle:{{FULLPAGENAME}}}}]]</span> | <span title="Seed on Newsvine">[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&u={{fullurle:{{FULLPAGENAME}}}}]]</span> | ||
</div> | </div> | ||
+ | |||
+ | '''Donate to OWASP ZSC''' {{#widget:PayPal Donation |target=_blank |budget=OWASP ZSC }} | ||
+ | |||
====What is OWASP ZSC ?==== | ====What is OWASP ZSC ?==== | ||
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-26_191951-half.png | http://zsc.z3r0d4y.com/images/Snapshot_2015-07-26_191951-half.png | ||
− | '''OWASP ZSC''' is an open source software in | + | '''OWASP ZSC''' is an open source software in Python language which lets you '''generate customized shellcodes''' and '''convert scripts to an obfuscated script'''. This software can be run on Windows/Linux/OSX under Python. |
+ | [[File:Zsc1.png|200px]] | ||
==Description== | ==Description== | ||
====Usage of shellcodes==== | ====Usage of shellcodes==== | ||
− | Shellcodes are small codes in | + | Shellcodes are small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc. |
====DISCLAIMER==== | ====DISCLAIMER==== | ||
This tool is related to IT, Hacking, Programming and Computer|Network|Software Security. The word “Hack”, "Pen testing",“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only. | This tool is related to IT, Hacking, Programming and Computer|Network|Software Security. The word “Hack”, "Pen testing",“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only. | ||
− | The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing | + | The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal. |
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
Line 40: | Line 44: | ||
====Usage of Obfuscate Codes==== | ====Usage of Obfuscate Codes==== | ||
− | Can be | + | Can be used for bypassing antiviruses, code protections, same stuff etc … |
====Why use OWASP ZSC ?==== | ====Why use OWASP ZSC ?==== | ||
Line 49: | Line 53: | ||
Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do. | Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do. | ||
− | According to other shellcode generators same as | + | According to other shellcode generators same as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. |
− | OWASP ZSC | + | OWASP ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP ZSC one of the best! |
During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. | During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. | ||
− | We are working on the next version that will allow you to generate OSX . | + | We are working on the next version that will allow you to generate OSX. |
==Licensing== | ==Licensing== | ||
Line 85: | Line 89: | ||
== Links == | == Links == | ||
+ | * [http://api.z3r0d4y.com/ API] | ||
* [https://github.com/Ali-Razmjoo/OWASP-ZSC Project on Github] | * [https://github.com/Ali-Razmjoo/OWASP-ZSC Project on Github] | ||
* [https://groups.google.com/d/forum/owasp-zsc Mailing List] | * [https://groups.google.com/d/forum/owasp-zsc Mailing List] | ||
Line 95: | Line 100: | ||
== Shellcode Generating == | == Shellcode Generating == | ||
− | With using '''OWASP ZSC''' you would be able to generate any customized '''Shellcode''' in your mind including encodes | + | With using '''OWASP ZSC''' you would be able to generate any customized '''Shellcode''' in your mind including encodes and Disassembly code in few seconds. |
== Be an OWASP ZSC developer == | == Be an OWASP ZSC developer == | ||
Line 122: | Line 127: | ||
== News and Events == | == News and Events == | ||
− | * OWASP ZSC has been selected for Defcon Demo Lab 2016 | + | * [https://www.owasp.org/index.php/Iran#tab=Past_Events OWASP Nettacker Presented By Ali Razmjoo in OWASP Iran Chapter Meeting July 2018] |
− | * OWASP ZSC applied and was selected to participate in the Google Summer of Code | + | * [https://www.owasp.org/index.php/OWASP_Code_Sprint_2017#OWASP_ZSC OWASP ZSC in OWASP Code Sprint 2017] |
− | * | + | * [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ OWASP ZSC Selected as Top 10 Security tools in 2016 By ToolsWatch] |
+ | * [https://groups.google.com/forum/#!topic/owasp-zsc/t12M2fxn78k OWASP ZSC Presented in OFFSECONF 2016] | ||
+ | * [https://www.blackhat.com/eu-16/arsenal.html#brian-beaudry Been Selected for Blackhat EU Arsenal 2016] | ||
+ | * [https://www.defcon.org/html/defcon-24/dc-24-demolabs.html#Curiel OWASP ZSC has been selected for Defcon Demo Lab 2016] | ||
+ | * [https://summerofcode.withgoogle.com/archive/2016/projects/5969824152813568/ OWASP ZSC applied and was selected to participate in the Google Summer of Code 2016] | ||
+ | * [https://www.linkedin.com/pulse/lessons-from-cyber-underworld-how-understand-software-ali-razmjoo Press Release 12th February 2015 ] | ||
* [http://zsc.z3r0d4y.com/ OWASP ZSC Version 1.0.9.1 Released!] | * [http://zsc.z3r0d4y.com/ OWASP ZSC Version 1.0.9.1 Released!] | ||
+ | * [https://github.com/longld/peda OWASP ZSC in GDB-PEDA] | ||
== Docs == | == Docs == | ||
Line 170: | Line 181: | ||
− | OWASP ZSC is an open source software in | + | OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python. |
Line 176: | Line 187: | ||
− | Shellcodes are small codes in | + | Shellcodes are small codes in Assembly Languagewhich could be used as the payload in software exploiting. Other usages are in malwares, bypassing anti viruses, obfuscated codes and etc. |
Line 182: | Line 193: | ||
− | Can be | + | Can be used for bypassing antiviruses, code protections, same stuff etc … |
Line 188: | Line 199: | ||
− | According to other shellcode generators such as | + | According to other shellcode generators such as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. OWASP ZSC encoders are able to generate shell codes with random encodes that allows you to generate thousands of new dynamic shell codes with the same job in just a second, it means you will not get the same code if you use random encodes with the same commands, and that makes OWASP ZSC one of the best! |
OWASP ZSC can generate shellcode for Linux and Windows _x86 | OWASP ZSC can generate shellcode for Linux and Windows _x86 | ||
− | Upcoming features will allow | + | Upcoming features will allow generating shellcodes for OSX |
And new encodes for the code obfuscation. | And new encodes for the code obfuscation. | ||
Line 200: | Line 211: | ||
======Generating Shellcode====== | ======Generating Shellcode====== | ||
− | Via `zsc` command , you are able to enter the software [or run python zsc.py if you don’t want install it], Then you can have list of menu with entering `help`. You can have your choices with pressing `tab` key on each step. To generate shellcode , you have to type `shellcode` and then press enter, after that, you can see what’s available in `shellcode` section. There is `generate` , `search` and `download` choices in here which use for `generate shellcodes` , `search` and `download` shellcode from shellstorm. To generate a shellcode, type `generate` and press enter, after that with a `tab` key, you can have list of operation systems available in there. With pressing `tab` key again, functions will be shown for you in this step [ such as `exec` ,`systm`,`write` and `etc`]. choose your function by writing the name `example: exec` and press inter. In the next section you have to fill the argv of function which exec() function have one `example: exec("/bin/bash")`, all you need in this section is pressing a `tab` and then `enter` key, software will automatically ask you for function argv. Fill them and next section software will ask you for shellcode type which can be `none` or choose one of listed encoding types. After entering that, your shellcode is ready! | + | Via `zsc` command, you are able to enter the software [or run python zsc.py if you don’t want to install it], Then you can have a list of menu with entering `help`. You can have your choices with pressing `tab` key on each step. To generate shellcode, you have to type `shellcode` and then press enter, after that, you can see what’s available in `shellcode` section. There is `generate` , `search` and `download` choices in here which use for `generate shellcodes`, `search` and `download` shellcode from shellstorm. To generate a shellcode, type `generate` and press enter, after that with a `tab` key, you can have list of operation systems available in there. With pressing `tab` key again, functions will be shown for you in this step [ such as `exec` ,`systm`,`write` and `etc`]. choose your function by writing the name `example: exec` and press inter. In the next section you have to fill the argv of function which exec() function have one `example: exec("/bin/bash")`, all you need in this section is pressing a `tab` and then `enter` key, software will automatically ask you for function argv. Fill them and next section software will ask you for shellcode type which can be `none` or choose one of listed encoding types. After entering that, your shellcode is ready! |
There is one more way to have a shellcode from software, which is using shellstorm API. Following the `shellcode`, and then `search` commands to search for a shellcode. After that shellcodes will be listed for you with title name , ID and etc. you can download them with following `shellcode` and then `download` command to download them with the ID which shown to you in the past section! For canceling each section, you can use `restart` command to restart the software and start new task! | There is one more way to have a shellcode from software, which is using shellstorm API. Following the `shellcode`, and then `search` commands to search for a shellcode. After that shellcodes will be listed for you with title name , ID and etc. you can download them with following `shellcode` and then `download` command to download them with the ID which shown to you in the past section! For canceling each section, you can use `restart` command to restart the software and start new task! | ||
Latest revision as of 02:55, 16 January 2020