This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP ZSC Tool Project"

From OWASP
Jump to: navigation, search
(What is OWASP ZSC ?)
(Help Menu)
Line 138: Line 138:
  
 
====Help Menu====
 
====Help Menu====
<pre><nowiki>
 
Switches:
 
-h, --h, -help, --help => to see this help guide
 
-os => choose your os to create shellcode
 
-oslist  => list os for switch -os
 
-o => output filename
 
-job => what shellcode gonna do for you ?
 
-joblist => list of -job switch
 
-encode => generate shellcode with encode
 
-types => types of encode for -encode switch
 
-wizard => wizard mod
 
  
-update => check for update
+
'''PLEASE CLICK [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE] TO SEE FULL DEVELOPERS AND USERS DOCUMENTS'''
-about => about software and developers.</nowiki></pre>
 
  
  
With these switch you can see the oslist,encode types and functions [joblist] to generate your shellcode.
+
======OWASP ZSC Project======
  
OS List "<strong>-oslist</strong>"
 
  
<pre><nowiki>
+
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.
[+] linux_x86
 
[+] linux_x64
 
[+] linux_arm
 
[+] linux_mips
 
[+] freebsd_x86
 
[+] freebsd_x64
 
[+] windows_x86
 
[+] windows_x64
 
[+] osx
 
[+] solaris_x86
 
[+] solaris_x64
 
</nowiki></pre>
 
  
Encode Types "<strong>-types</strong>"
 
  
<pre><nowiki>
+
======Usage of shellcodes======
[+] none
 
[+] xor_random
 
[+] xor_yourvalue
 
[+] add_random
 
[+] add_yourvalue
 
[+] sub_random
 
[+] sub_yourvalue
 
[+] inc
 
[+] inc_timesyouwant
 
[+] dec
 
[+] dec_timesyouwant
 
[+] mix_all
 
</nowiki></pre>
 
  
Functions "<strong>-joblist</strong>"
 
  
<pre><nowiki>
+
Shellcodes are small codes in assembly which could be use as the payload in software exploiting. Other usages are in malwares, bypassing anti viruses, obfuscated codes and etc.
[+] exec('/path/file')
 
[+] chmod('/path/file','permission number')
 
[+] write('/path/file','text to write')
 
[+] file_create('/path/file','text to write')
 
[+] dir_create('/path/folder')
 
[+] download('url','filename')
 
[+] download_execute('url','filename','command to execute')
 
[+] system('command to execute')
 
[+] script_executor('name of script','path and name of your script in your pc','execute command')
 
</nowiki></pre>
 
  
  
Now you are able to choose your operation system, function, and encode to generate your shellcode, But all of these features are not activated yet, so you have to look up this table [http://zsc.z3r0d4y.com/table.html HERE] to see what features are activated.
+
======Usage of Obfuscate Codes======
  
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-27_123106.png
 
  
For example, this part of table telling us all functions for linux_x86 is activated, But <strong>Encodes</strong> [xor_random, xor_yourvalue, add_random, add_yourvalue, sub_random, sub_yourvalue, inc, inc_timesyouwant, dec, dec_timesyouwant] are just activated for <strong>chmod()</strong> function.
+
Can be use for bypassing antiviruses , code protections , same stuff etc …
 +
 
 +
 
 +
======Why use OWASP ZSC ?======
 +
 
 +
 
 +
According to other shellcode generators such as metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. OWASP ZSC encoders are able to generate shellcodes with random encodes that lets you to get thousands of new dynamic shellcodes with the same job in just a second, it means you will not get a same code if you use random encodes with same commands, and that makes OWASP ZSC one of the bests! otherwise it's going to generate shellcodes for other operation systems in the next versions.
 +
It’s the same story for the code obfuscation.
 +
 
 +
 
 +
======User Guides======
 +
 
 +
To run '''OWASP ZSC''', You need to install python `2.x|3.x` on your operation system `Windows|Linux|OSX`, Then it could be run directly with executing `zsc.py` or run the software after you installed it! To see the user manuals, Please follow the next steps!
 +
 
 +
 
 +
 
 +
======Installation======
 +
 
 +
 
 +
Go to download page, and download the last version on Github. Extract and run installer.py, then you are able to run software with OWASP ZSC command `zsc` or you can directly execute zsc.py without installing it, or you can follow these commands to install the last version:
 +
 
 +
```
 +
wget https://github.com/Ali-Razmjoo/OWASP-ZSC/archive/master.zip \
 +
-O owasp-zsc.zip && unzip owasp-zsc.zip && rm -rf owasp-zsc.zip &&
 +
mv OWASP-ZSC-master owasp-zsc && cd owasp-zsc && python installer.py
 +
```
 +
 
 +
 
 +
* Software could be uninstall with executing uninstaller.py
 +
* Software installation directory is “/usr/share/owasp-zsc”
 +
 
 +
======Generating Shellcode======
 +
 
 +
Via `zsc` command , you are able to enter the software [or run python zsc.py if you don’t want install it], Then you can have list of menu with entering `help`. You can have your choices with pressing `tab` key on each step. To generate shellcode , you have to type `shellcode` and then press enter, after that, you can see what’s available in `shellcode` section. There is `generate` , `search` and `download` choices in here which use for `generate shellcodes` , `search` and `download` shellcode from shellstorm.  To generate a shellcode, type `generate` and press enter, after that with a `tab` key, you can have list of operation systems available in there. With pressing `tab` key again, functions will be shown for you in this step [ such as `exec` ,`systm`,`write` and `etc`]. choose your function by writing the name `example: exec` and press inter. In the next section you have to fill the argv of function which exec() function have one `example: exec("/bin/bash")`, all you need in this section is pressing a `tab` and then `enter` key, software will automatically ask you for function argv. Fill them and next section software will ask you for shellcode type which can be `none` or choose one of listed encoding types. After entering that, your shellcode is ready!
 +
There is one more way to have a shellcode from software, which is using shellstorm API. Following the `shellcode`, and then `search` commands to search for a shellcode. After that shellcodes will be listed for you with title name , ID and etc. you can download them with  following `shellcode` and then `download` command to download them with the ID which shown to you in the past section! For canceling each section, you can use `restart` command to restart the software and start new task!
 +
 
 +
 
 +
======Generating Obfuscate Code======
 +
 
 +
With the following `obfuscate` command, you can begin the step for obfuscating a code. With a `tab` key , you can see the list of languages along with the obfuscating module ready. After choosing the language software will ask you for a filename which is a filename of file you want to obfuscate that! Next step software will ask you for encode type. With a `tab` key list the encode modules and choose your encode name. your file rewrited and converted to a obfuscate with encode type you chosen. And do not worry about your original code, it’s saved in file as a comment!
 +
 
 +
Please click '''[https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE]''' to read more!
 +
 
 
===Examples===
 
===Examples===
 
<pre><nowiki>
 
<pre><nowiki>

Revision as of 21:30, 3 February 2016

OWASP Project Header.jpg

OWASP ZSC Tool Project

What is OWASP ZSC ?

OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.

Snapshot_2015-07-26_191951-half.png

OWASP ZSC Home

Description

Usage of shellcodes

Shellcodesare small codes in assembly which could be use as the payload in software exploiting. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc.

Usage of Obfuscate Codes

Can be use for bypassing antiviruses , code protections , same stuff etc …

Why use OWASP ZSC ?

According to other shellcode generators same as metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. OWASP ZSC encoderes are able to generate shellcodes with random encodes and that's lets you to get thousands new dynamic shellcodes with same job in just a second,that means you will not get a same code if you use random encodes with same commands, And that make OWASP ZSC one of the bests! otherwise it's gonna generate shellcodes for many operation systems in next versions. It’s the same story for code obfuscating.

Licensing

GNU GENERAL PUBLIC LICENSE , Version 3, 29 June 2007

Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Click to see the full license


The OWASP Security Principles are free to use. In fact it is encouraged!!! Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.

The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.


Project Leaders

Links

Shellcode Generating

With using OWASP ZSC you would be able to generate any customized Shellcode in your mind including encodes,and Disassembly code in few seconds.

Be an OWASP ZSC developer

Last Tricks in Home


Quick Download

Github Page.

Download Page.

News and Events

Docs

Classifications

New projects.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg