OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
Shellcodes are small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malware, bypassing antivirus software, obfuscating code for protection and so on.
This software can be run on Windows/Linux/OSX under Python.
Why use OWASP ZSC Obfuscated Code Generator Tool
Another good reason for obfuscating files or generating shellcode with ZSC is that it can be used for pen-testing assignments. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators. Anti-virus tend to utilise signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by anti-virus programs.
According to other shellcode generators same as Metasploit tools etc, OWASP ZSC using new encodes and methods which antiviruses won’t detect. OWASP ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands.
There is also this tool to check out:
You can download OWASP ZSC here:
Or read more here.
2017 News Stories
All kinds of things happened in 2017 starting with some pretty comical shit and the MongoDB Ransack – Over 33,000 Databases Hacked, I’ve personally had very poor experienced with MongoDB in general and I did notice the sloppy defaults (listen on all interfaces, no password) when I used it, I believe the defaults have been corrected – but I still don’t have a good impression of it. It also didn’t stop there with Another MongoDB Hack Leaks Two Million Recordings Of Kids
Everyone scrambled in March when they found out Ubiquiti Wi-Fi Gear Hackable Via 1997 PHP Version.
There was also the regular dodgy Government legislation based activity like the European Commission Pushing For Encryption Backdoors and the US demanding people to hand over their social media passwords when entering the country.
Plus the governments themselves getting owned when Shadow Brokers Release Dangerous NSA Hacking Tools.
There was also a spate of high profile hacks, many involving publically accessibly AWS S3 buckets like the Time Warner Hacked – AWS Config Exposes 4M Subscribers and Terabytes Of US Military Social Media Spying S3 Data Exposed.
2017 Best Hacking Tools
There’s been some pretty neat stuff released this year, the below are tools that’s I’ve personally found interesting but haven’t been super high traffic:
- p0wnedShell – PowerShell Runspace Post Exploitation Toolkit
- mongoaudit – MongoDB Auditing & Pen-testing Tool
- Powerfuzzer – Automated Customizable Web Fuzzer
- spectrology – Basic Audio Steganography Tool
- PwnBin – Python Pastebin Search Tool
- Github Dorks – Github Security Scanning Tool
- CyberChef – Cyber Swiss Army Knife
- GitMiner – Advanced Tool For Mining Github
- AWSBucketDump – AWS S3 Security Scanning Tool
- WPSeku – Black-Box Remote WordPress Security Scanner
You may have overlooked some of these, so do check them out if you did!
You’ve probably already seen those below in the most viewed list, but well if you haven’t check out the below for the hottest posts published in 2017.
Bonus – Top 10 Most Viewed Posts From 2017
- Angry IP Scanner Download – Fast Network IP Scanner
- Fluxion – Automated EvilAP Attack Tool
- Reaver Download – Hack WPS Pin WiFi Networks
- LOIC Download – Low Orbit Ion Cannon DDoS Booter
- RDPY – RDP Security Tool For Hacking Remote Desktop Protocol
- Sn1per – Penetration Testing Automation Scanner
- Yuki Chan – Automated Penetration Testing Tool
- LastPass Hacked – Leaking Passwords Via Chrome Extension
- Shadow Brokers Release Dangerous NSA Hacking Tools
- SQLiv – SQL Injection Dork Scanning Tool
Enjoy 2018, it’s gonna be a crazy, decentralised year!
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 “speculative execution” CVEs that were made public early 2018.
Without options, it’ll inspect you currently running kernel. You can also specify a kernel image on the command line, if you’d like to inspect a kernel you’re not running.
The script will do its best to detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number.
Summary of the CVEs in Spectre & Meltdown Checker
CVE-2017-5753 bounds check bypass (Spectre Variant 1)
- Impact: Kernel & all software
- Mitigation: recompile software and kernel with a modified compiler that introduces the LFENCE opcode at the proper positions in the resulting code
- Performance impact of the mitigation: negligible
CVE-2017-5715 branch target injection (Spectre Variant 2)
- Impact: Kernel
- Mitigation 1: new opcode via microcode update that should be used by up to date compilers to protect the BTB (by flushing indirect branch predictors)
- Mitigation 2: introducing “retpoline” into compilers, and recompile software/OS with it
- Performance impact of the mitigation: high for mitigation 1, medium for mitigation 2, depending on your CPU
CVE-2017-5754 rogue data cache load (Meltdown)
- Impact: Kernel
- Mitigation: updated kernel (with PTI/KPTI patches), updating the kernel is enough
- Performance impact of the mitigation: low to medium
There are some other more generic BASH scripts for security scanning like:
You can download Spectre & Meltdown Checker here:
Or read more here.
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
It offers a simple and easy UI to use these tools without typing commands in a console and copy & pasting MAC addresses.
Features of Hijacker Reaver For Android Wifi Hacker App
- View a list of access points and stations (clients) around you (even hidden ones)
- View the activity of a specific network (by measuring beacons and data packets) and its clients
- Statistics about access points and stations
- See the manufacturer of a device (AP or station) from the OUI database
- See the signal power of devices and filter the ones that are closer to you
- Save captured packets in .cap file
Reaver for Android Wifi Cracker Attacks
- Deauthenticate all the clients of a network (either targeting each one or without specific target)
- Deauthenticate a specific client from the network it’s connected
- MDK3 Beacon Flooding with custom options and SSID list
- MDK3 Authentication DoS for a specific network or to every nearby AP
- Capture a WPA handshake or gather IVs to crack a WEP network
- Reaver WPS cracking (pixie-dust attack using NetHunter chroot and external adapter)
Other Wifi Hacker App Features
- Leave the app running in the background, optionally with a notification
- Copy commands or MAC addresses to clipboard
- Includes the required tools, no need for manual installation
- Includes the nexmon driver and management utility for BCM4339 devices
- Set commands to enable and disable monitor mode automatically
- Crack .cap files with a custom wordlist
- Create custom actions and run them on an access point or a client easily
- Sort and filter Access Points and Stations with many parameters
- Export all gathered information to a file
- Add a persistent alias to a device (by MAC) for easier identification
Requirements to Crack Wifi Password with Android
This application requires an ARM Android device with an internal wireless adapter that supports Monitor Mode. A few android devices do, but none of them natively. This means that you will need a custom firmware. Any device that uses the BCM4339 chipset (MSM8974, such as Nexus 5, Xperia Z1/Z2, LG G2, LG G Flex, Samsung Galaxy Note 3) will work with Nexmon (which also supports some other chipsets). Devices that use BCM4330 can use bcmon.
An alternative would be to use an external adapter that supports monitor mode in Android with an OTG cable.
The required tools are included for armv7l and aarch64 devices as of version 1.1. The Nexmon driver and management utility for BCM4339 are also included.
Root is also necessary, as these tools need root to work.
Other tools to check out would be:
You can download Hijacker Reaver for Android Wifi Hacker App here:
Or read more here.
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. It also integrates with subbrute for subdomain brute-forcing with word lists. Features of Sublist3r Subdomain Enumeration Tool It enumerates subdomains using many search engines such […]
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys. If you are auditing WPA-PSK networks, you can use this tool to identify weak passphrases that were used to generate the PMK. Supply a libpcap capture file that includes the 4-way handshake, a dictionary file of passphrases […]