martes, 25 de agosto de 2020

OWASP-ZSC: A Shellcode/Obfuscate Customized Code Generating Tool


About OWASP-ZSC
   OWASP ZSC is open source software written in python which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX with Python 2 or 3.

   What is shellcode?: Shellcode is a small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes...

   You can read more about OWASP-ZSC in these link:
Why use OWASP-ZSC?
   Another good reason for obfuscating files or generating shellcode with OWASP-ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators. Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.

   Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.

   According to other shellcode generators same as Metasploit tools and etc, OWASP-ZSC  using new encodes and methods which antiviruses won't detect. OWASP-ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP-ZSC one of the best! During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. We are working on the next version that will allow you to generate OSX.

OWASP-ZSC Installation:
   You must install Metasploit and Python 2 or 3 first:
  • For Debian-based distro users: sudo apt install python2 python3 metasploit-framework
  • For Arch Linux based distro users: sudo pacman -S python2 python3 metasploit
  • For Windows users: Download Python and Metasploit here.
   And then, enter these command (If you're Windows user, don't enter sudo):
DISCLAIMER: THIS SOFTWARE WAS CREATED TO CHALLENGE ANTIVIRUS TECHNOLOGY, RESEARCH NEW ENCRYPTION METHODS, AND PROTECT SENSITIVE OPEN SOURCE FILES WHICH INCLUDE IMPORTANT DATA. CONTRIBUTORS AND OWASP FOUNDATION WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

An example of OWASP-ZSC

More information


  1. Pentest Tools Windows
  2. Pentest Box Tools Download
  3. Pentest Tools Android
  4. Pentest Tools Tcp Port Scanner
  5. Hak5 Tools
  6. Pentest Tools Download
  7. Best Hacking Tools 2020
  8. Pentest Tools Alternative
  9. Hacker Tools Free
  10. Hacking Tools 2019
  11. Hacking Tools For Beginners
  12. Hacker Tools Apk
  13. Hacking Tools Mac
  14. Hack Rom Tools
  15. Pentest Recon Tools
  16. Hack Tools For Games
  17. Easy Hack Tools
  18. Hack Tools For Windows
  19. Pentest Tools Tcp Port Scanner
  20. Hacker Tools For Pc
  21. Blackhat Hacker Tools
  22. Underground Hacker Sites
  23. Hacking Tools For Windows
  24. Hack Tools Online
  25. What Is Hacking Tools
  26. Android Hack Tools Github
  27. Github Hacking Tools
  28. Hack Tools For Mac
  29. Hacker Tools For Mac
  30. Top Pentest Tools
  31. Pentest Tools Find Subdomains
  32. Usb Pentest Tools
  33. Hacking Tools For Kali Linux
  34. Hacking Tools Name
  35. Hack Tools
  36. Pentest Tools Review
  37. Hacker Tools For Ios
  38. What Are Hacking Tools
  39. Hacking Tools And Software
  40. Hacker Tools 2020
  41. Kik Hack Tools
  42. Hacking Tools Github
  43. How To Install Pentest Tools In Ubuntu
  44. Pentest Tools Android
  45. Growth Hacker Tools
  46. Hack Tools Pc
  47. Hacking Tools For Games
  48. Pentest Tools Url Fuzzer
  49. Hacker Search Tools
  50. Install Pentest Tools Ubuntu
  51. Hacker Tools Apk Download
  52. World No 1 Hacker Software
  53. Pentest Tools Linux
  54. Hacker Tools Hardware
  55. Hacker Tools Windows
  56. Hacker Tools Apk
  57. Pentest Tools Download
  58. Hacker Tools Linux
  59. Hacker Tool Kit
  60. Hacker Tools Linux
  61. Hacker Search Tools
  62. Pentest Automation Tools
  63. Hack Tools
  64. Pentest Tools Review
  65. Hack Tools Mac
  66. Nsa Hacker Tools
  67. Hack Tools Github
  68. Hack App
  69. Best Hacking Tools 2020
  70. Pentest Tools Download
  71. Hacking Tools
  72. Hacking Tools And Software
  73. Pentest Recon Tools
  74. Wifi Hacker Tools For Windows
  75. Beginner Hacker Tools
  76. Pentest Automation Tools
  77. Free Pentest Tools For Windows
  78. Nsa Hack Tools Download
  79. Hacking Tools Windows
  80. Hack Tools Github
  81. Hacker Tools List
  82. Hacking Tools Download
  83. Tools For Hacker
  84. Hacking Tools Name
  85. Hack Tools Download
  86. Pentest Tools Port Scanner
  87. Pentest Tools Alternative
  88. Hack Apps
  89. Hak5 Tools
  90. Blackhat Hacker Tools
  91. What Are Hacking Tools
  92. Hackers Toolbox
  93. Hacking Tools 2020
  94. Underground Hacker Sites
  95. Hacking Tools 2019
  96. Hacking Tools Mac
  97. Pentest Tools Download
  98. Hacking Tools For Mac
  99. Tools 4 Hack
  100. Pentest Reporting Tools
  101. Hacker Tools Software
  102. Pentest Tools Website
  103. Pentest Tools Framework
  104. Install Pentest Tools Ubuntu
  105. Hacking Tools For Mac
  106. What Is Hacking Tools
  107. Hacker Tools 2020
  108. Ethical Hacker Tools
  109. Pentest Tools Website
  110. Pentest Tools Windows
  111. Game Hacking
  112. Android Hack Tools Github
  113. Hack Tools For Ubuntu
  114. Hacker Tools Github
  115. Hack Tools Download
  116. Hack Apps
  117. Beginner Hacker Tools
  118. Hacking Tools 2020
  119. Hacking Tools Pc
  120. Hack Tools Github
  121. Pentest Tools Website Vulnerability
  122. Pentest Tools Find Subdomains
  123. Hackers Toolbox
  124. Pentest Tools Download
  125. How To Install Pentest Tools In Ubuntu
  126. Hacking Tools Mac
  127. Pentest Tools Kali Linux
  128. Pentest Tools For Ubuntu
  129. Hacking Tools Software
  130. Hack Tools Github
  131. Hacker Tools Hardware
  132. Hack Tools For Windows
  133. Pentest Tools
  134. Pentest Tools Port Scanner
  135. Hacker Tools Github
  136. Underground Hacker Sites
  137. Hacker Tools 2020
  138. Hacking Tools Kit
  139. Pentest Tools Subdomain
  140. Hak5 Tools
  141. Hack Tools For Games
  142. Pentest Tools Port Scanner
  143. Hacker Tools Hardware
  144. Hacking Tools Github
  145. Best Pentesting Tools 2018
  146. Hack Tools Github
  147. Hacking Tools Download
  148. Ethical Hacker Tools
  149. Hacker Tools Github
  150. Best Hacking Tools 2019
  151. Hack Apps
  152. Hacking Tools Kit
  153. Nsa Hacker Tools
  154. Pentest Tools Github
  155. Kik Hack Tools
  156. Pentest Tools Nmap
  157. Hacker Hardware Tools
  158. Pentest Tools Subdomain
  159. Underground Hacker Sites
  160. Hacker Tools Hardware
  161. Tools For Hacker
  162. Tools Used For Hacking
  163. Hack Tool Apk No Root
  164. Hacking Tools Pc
  165. Hacking Tools Windows

Steghide - A Beginners Tutorial




All of us want our sensitive information to be hidden from people and for that we perform different kinds of things like hide those files or lock them using different softwares. But even though we do that, those files  attractive people to itself as an object of security. Today I'm going to give you a slight introduction to what is called as Steganography. Its a practice of hiding an informational file within another file like you might have seen in movies an image has a secret message encoded in it. You can read more about Steganography from Wikipedia.


In this tutorial I'm going to use a tool called steghide, which is a simple to use Steganography tool and I'm running it on my Arch Linux. What I'm going to do is simply encode an image with a text file which contains some kind of information which I don't want other people to see. And at the end I'll show you how to decode that information back. So lets get started:


Requirements:

1. steghide
2. a text file
3. an image file

After you have installed steghide, fire up the terminal and type steghide




It will give you list of options that are available.


Now say I have a file with the name of myblogpassword.txt which contains the login password of my blog and I want to encode that file into an Image file with the name of arch.jpg so that I can hide my sensitive information from the preying eyes of my friends. In order to do that I'll type the following command in my terminal:


steghide embed -ef myblogpassword.txt -cf arch.jpg




here steghide is the name of the program

embed flag is used to specify to steghide that we want to embed one file into another file
-ef option is used to specify to steghide the name (and location, in case if its in some other directory) of the file that we want to embed inside of the another file, in our case its myblogpassword.txt
-cf option is used to specify the name (and location, in case if its in some other directory) of the file in which we want to embed our file, in our case its an image file named arch.jpg

After typing the above command and hitting enter it will prompt for a password. We can specify a password here in order to password protect our file so that when anyone tries to extract our embedded file, they'll have to supply a password in order to extract it. If you don't want to password protect it you can just simply hit enter.


Now myblogpassword.txt file is embedded inside of the image file arch.jpg. You'll see no changes in the image file except for its size. Now we can delete the plain password text file myblogpassword.txt.


In order to extract the embedded file from the cover file, I'll type following command in the terminal:


steghide extract -sf arch.jpg -xf myblogpass.txt




here steghide is again name of the program
extract flag specifies that we want to extract an embedded file from a stego file
-sf option specifies the name of the stego file or in other words the file in which we embedded another file, in our case here its the arch.jpg file
-xf option specifies the name of the file to which we want to write our embedded file, here it is myblogpass.txt
(remember you must specify the name of file with its location if its somewhere else than the current directory)

After typing the above command and hitting enter, it will prompt for a password. Supply the password if any or otherwise just simply hit enter. It will extract the embedded file to the file named myblogpass.txt. Voila! you got your file back but yes the image file still contains the embedded file.


That's it, very easy isn't it?


It was a pretty basic introduction you can look for other things like encrypting the file to be embedded before you embed it into another file and so on... enjoy
:)

More information

Google Researcher Reported 3 Flaws In Apache Web Server Software

If your web-server runs on Apache, you should immediately install the latest available version of the server application to prevent hackers from taking unauthorized control over it. Apache recently fixed multiple vulnerabilities in its web server software that could have potentially led to the execution of arbitrary code and, in specific scenarios, even could allow attackers to cause a crash

via The Hacker NewsRelated posts
  1. Pentest Reporting Tools
  2. Hacking Tools For Windows
  3. Hack Tools Online
  4. How To Hack
  5. Hacking Tools For Pc
  6. Hacker Tools For Pc
  7. Nsa Hack Tools Download
  8. Hacker Tools
  9. Tools For Hacker
  10. Install Pentest Tools Ubuntu
  11. Hackrf Tools
  12. Hacking Tools Usb
  13. Hacker Tools Linux
  14. Pentest Tools Free
  15. Hacking Tools For Games
  16. Pentest Tools Website Vulnerability
  17. Install Pentest Tools Ubuntu
  18. Hacking Tools For Pc
  19. Nsa Hacker Tools
  20. Hack Tool Apk
  21. Pentest Tools Windows
  22. Pentest Tools Free
  23. Hacker Tool Kit
  24. Pentest Tools Apk
  25. Hack Tools Mac
  26. Hack Tools Mac
  27. Hacker Tools Free Download
  28. Physical Pentest Tools
  29. What Is Hacking Tools
  30. Pentest Tools Apk
  31. Best Hacking Tools 2019
  32. Hack Tool Apk
  33. Tools 4 Hack
  34. Hacker Tools Hardware
  35. Pentest Tools Port Scanner
  36. Pentest Tools Website
  37. Hacker Tools Windows
  38. Wifi Hacker Tools For Windows
  39. Hacker Tools For Ios
  40. Hacker Tools 2019
  41. Wifi Hacker Tools For Windows
  42. Top Pentest Tools
  43. Hack Tools 2019
  44. New Hack Tools
  45. Hacking Tools And Software
  46. Kik Hack Tools
  47. Hack Website Online Tool
  48. Android Hack Tools Github
  49. Github Hacking Tools
  50. Hacker Tools List
  51. Pentest Tools Url Fuzzer
  52. Pentest Tools Url Fuzzer
  53. Nsa Hacker Tools
  54. Android Hack Tools Github
  55. Pentest Tools For Mac
  56. New Hack Tools
  57. Pentest Automation Tools
  58. Hack Tools
  59. Hacker Tool Kit
  60. Hacking Tools Windows
  61. Hacker Hardware Tools
  62. Hacker Tools For Pc
  63. Tools For Hacker
  64. Bluetooth Hacking Tools Kali
  65. Best Hacking Tools 2019
  66. Hacker Tools Windows
  67. Tools Used For Hacking
  68. Pentest Tools Url Fuzzer
  69. Nsa Hacker Tools
  70. Pentest Tools Find Subdomains
  71. Hacker Tools Mac
  72. Pentest Tools For Android
  73. New Hacker Tools
  74. Hacker Tools For Windows
  75. How To Make Hacking Tools
  76. Blackhat Hacker Tools
  77. Hacker Tools Hardware
  78. Hacking Tools For Beginners
  79. Hacking Tools Software
  80. Hacker Search Tools
  81. Top Pentest Tools
  82. Hacking Tools Pc
  83. Hackrf Tools
  84. Pentest Reporting Tools
  85. Hack Tools 2019
  86. What Are Hacking Tools
  87. Pentest Tools Review
  88. Hacker Tools For Mac
  89. Nsa Hacker Tools
  90. Nsa Hack Tools
  91. Hacker Tools Hardware
  92. Hack Tools Github
  93. Hacker
  94. Pentest Box Tools Download
  95. How To Install Pentest Tools In Ubuntu
  96. Hacking Tools For Mac
  97. Pentest Tools List
  98. Hak5 Tools
  99. Hacking Tools Kit
  100. Underground Hacker Sites
  101. Hacking Tools For Mac
  102. Hacking Tools For Mac
  103. Hacking Tools For Beginners
  104. Pentest Tools For Windows
  105. Hacking Tools Software
  106. Hacking Tools For Pc
  107. Pentest Tools
  108. Hack Rom Tools
  109. Android Hack Tools Github
  110. Pentest Recon Tools
  111. Pentest Tools Tcp Port Scanner
  112. Hacking Tools Windows
  113. Hacker Tools Online
  114. Termux Hacking Tools 2019
  115. Nsa Hacker Tools
  116. Nsa Hack Tools
  117. Pentest Tools
  118. Hacking Tools Software
  119. Pentest Tools
  120. Hacker Tools List
  121. Hacking Tools Usb
  122. Hacker Tools Windows
  123. Pentest Tools
  124. Hacking Tools For Beginners
  125. Hacker Tools
  126. Pentest Tools Website Vulnerability
  127. Hacking Tools Online
  128. Pentest Tools Port Scanner
  129. Tools For Hacker
  130. Usb Pentest Tools
  131. Hack And Tools
  132. Hacker Tools Apk
  133. Pentest Tools Website Vulnerability
  134. Hacker Tools Apk
  135. Pentest Tools Tcp Port Scanner
  136. Pentest Recon Tools
  137. Hack Website Online Tool
  138. Pentest Tools Github
  139. Pentest Automation Tools
  140. Hacker Techniques Tools And Incident Handling
  141. How To Install Pentest Tools In Ubuntu
  142. Hacking Tools Github
  143. Hack Tool Apk
  144. Pentest Tools Online
  145. Hacking Tools Name
  146. Hack Tools For Mac
  147. Pentest Tools Find Subdomains
  148. Tools Used For Hacking
  149. Pentest Tools List
  150. Hacker Tools For Mac
  151. Pentest Tools Subdomain
  152. Hacker Tools Apk
  153. Hacker Tools For Mac
  154. Hacking Tools For Mac
  155. Hacking Tools Mac
  156. Kik Hack Tools
  157. Hacker Tools For Mac
  158. Pentest Tools Find Subdomains
  159. Bluetooth Hacking Tools Kali
  160. Hacks And Tools
  161. Hack Tools Pc
  162. Hack Rom Tools
  163. Pentest Tools Bluekeep
  164. Hak5 Tools
  165. Hacks And Tools
  166. Hacking Tools Name
  167. Hack Tools For Windows
  168. Hack Tools Mac
  169. Pentest Tools Kali Linux
  170. Hacking Tools
  171. Hacker Security Tools
  172. Beginner Hacker Tools
  173. Best Hacking Tools 2020
  174. Hack Tools Github
  175. Pentest Tools Linux
  176. Best Hacking Tools 2019
  177. Pentest Tools Windows