new searching feature

11 views
Skip to first unread message

Ali Razmjoo

unread,
Jul 26, 2016, 8:06:38 AM7/26/16
to OWASP ZSC
Hello friends, new searching feature just added, check it out.



Pratik Patel

unread,
Jul 26, 2016, 12:57:35 PM7/26/16
to OWASP ZSC
Amazing feature. working well on both python 2 and 3 (ubuntu). This feature can be really helpful with command line

Akash Trehan

unread,
Jul 26, 2016, 1:22:57 PM7/26/16
to OWASP ZSC
Yeah, really works nicely with `grep` command. You can search keywords etc. 
I was thinking maybe we could take another argument and automate this grep.

Ali Razmjoo

unread,
Jul 26, 2016, 8:47:54 PM7/26/16
to Akash Trehan, OWASP ZSC
give me some example Akash.
On Tue, Jul 26, 2016 at 9:52 PM, Akash Trehan <akash.t...@gmail.com> wrote:
Yeah, really works nicely with `grep` command. You can search keywords etc. 
I was thinking maybe we could take another argument and automate this grep.

--
You received this message because you are subscribed to the Google Groups "OWASP ZSC" group.
To unsubscribe from this group and stop receiving emails from it, send an email to owasp-zsc+...@googlegroups.com.
To post to this group, send email to owas...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/owasp-zsc/90aada85-3928-49c3-8184-74589c45d8d4%40googlegroups.com.

For more options, visit https://groups.google.com/d/optout.

Akash Trehan

unread,
Jul 27, 2016, 2:15:02 AM7/27/16
to OWASP ZSC

For e.g as of now ... running `zsc -l -s | grep -i linux` gives all the linux shellcodes and `zsc -l -s | grep -i x86` gives all x86 shellcodes. What I mean is that we can process the command `zsc -l -s linux` and make it work like `zsc -l -s | grep -i linux`. A similar thing can be done for `zsc -l linux` for searching for linux shellcodes in zsc. (I know `zsc -l linux_x86` works but I hope you get my point from the above 2 examples for searching for any string which occurs in the name of the shellcode)

Ali Razmjoo

unread,
Jul 27, 2016, 2:26:37 AM7/27/16
to Akash Trehan, OWASP ZSC
It's already done, but because of users may select an os or a programming lang, I make the default like:
zsc -l windows_x86 => select windows_x86 shellcode
zsc -l windows => select nothing, because it's not specific os in our tool BUT
zsc -l windows* => selecting payloads which starting with windows
zsc -l *x86* or zsc -l *windows* => working same as grep.

by using *x86* or *windows* software doesn't care payload starting or ending with what, it's just searching like grep.
also there is one more zsc -l windows*xor_random to make specific the starting and ending words for searching.




--
You received this message because you are subscribed to the Google Groups "OWASP ZSC" group.
To unsubscribe from this group and stop receiving emails from it, send an email to owasp-zsc+...@googlegroups.com.
To post to this group, send email to owas...@googlegroups.com.

Akash Trehan

unread,
Jul 27, 2016, 3:11:27 AM7/27/16
to Ali Razmjoo, OWASP ZSC
Oh cool. I didn't know *windows* worked. Nice work with the command line interface!
--
Second Year Undergraduate,
Computer Science,
IIT Bombay.
Reply all
Reply to author
Forward
0 new messages