Skip to content

Commit 5a525fc

Browse files
committed
Merge branch 'dev'
2 parents 3b997f3 + c2d882c commit 5a525fc

File tree

4 files changed

+206
-4
lines changed

4 files changed

+206
-4
lines changed

LICENSE

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
ZARP NETWORK ATTACK TOOL
2-
Copyright (C) 2012 - 2013 drone <drone AT ballastsecurity DOT com>
2+
Copyright (C) 2012 - 2014 drone <drone AT ballastsecurity DOT com>
33

44
This program is free software: you can redistribute it and/or modify
55
it under the terms of the GNU General Public License as published by

README

Lines changed: 0 additions & 2 deletions
This file was deleted.

README.md

Lines changed: 204 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,204 @@
1+
Introduction
2+
==
3+
4+
Zarp is a network attack tool centered around the exploitation of local networks. This does not include system exploitation, but rather abusing networking protocols and stacks to take over, infiltrate, and knock out. Sessions can be managed to quickly poison and sniff multiple systems at once, dumping sensitive information automatically or to the attacker directly. Various sniffers are included to automatically parse usernames and passwords from various protocols, as well as view HTTP traffic and more. DoS attacks are included to knock out various systems and applications. These tools open up the possibility for very complex attack scenarios on live networks quickly, cleanly, and quietly.
5+
6+
The long-term goal of zarp is to become the master command center of a network; to provide a modular, well-defined framework that provides a powerful overview and in-depth analysis of an entire network. This will come to light with the future inclusion of a web application front-end, which acts as the television screen, whereas the CLI interface will be the remote. This will provide network topology reports, host relationships, and more. zarp aims to be your window into the potential exploitability of a network and its hosts, not an exploitation platform itself; it is the manipulation of relationships and trust felt within local intranets. Look for zeb, the web-app frontend to zarp, sometime in the future.
7+
8+
Current version: 1.5
9+
Current dev version: 1.6
10+
11+
Installation
12+
==
13+
zarp is intended to be as dependency-free as possible. When available, zarp has opted to use pure or native Python implementations over requiring or importing huge libraries. Even as such, zarp requires the following to run:
14+
15+
* Linux
16+
* Python 2.7.x
17+
* Scapy (packaged with zarp)
18+
19+
It is also recommended that user's have the following installed for access to specific modules:
20+
21+
* airmon-ng suite (for all your wireless cracking needs)
22+
* tcpdump
23+
* libmproxy (packaged with zarp)
24+
* paramiko (SSH service)
25+
* nfqueue-bindings (packet modifier)
26+
27+
The recommended installation process is to run:
28+
29+
```
30+
git clone git://github.com/hatRiot/zarp.git
31+
```
32+
33+
You can then run:
34+
35+
```
36+
sudo python zarp.py --update
37+
```
38+
39+
to update zarp. The update flag will not work if you download the tarball from the Git page.
40+
41+
Scapy comes packaged with Zarp and no installation is required. Wifite is used for wireless AP cracking; a specific version (ballast-dev branch) is required. This comes packaged with zarp. There are some dependencies required for Scapy, but most should be pretty easy to install or already be installed.
42+
43+
Tool Overview
44+
==
45+
Broad categories are (see wiki for more information on these):
46+
* Poisoners
47+
* Denial of Service
48+
* Sniffers
49+
* Scanners
50+
* Services
51+
* Parameter
52+
* Attacks
53+
54+
CLI Usage and Shortcuts
55+
==
56+
```
57+
> help
58+
59+
zarp options:
60+
help - This menu
61+
opts - Dump zarp current settings
62+
exit - Exit immediately
63+
bg - Put zarp to background
64+
set [key] [value] - Set key to value
65+
66+
zarp module options:
67+
[int] [value] - Set option [int] to value [value]
68+
[int] o - View options for setting
69+
run (r) - Run the selected module
70+
info - Display module information
71+
72+
```
73+
74+
Modules can be navigated to by nesting entries:
75+
```
76+
bryan@debdev:~/tools/zarp$ sudo ./zarp.py
77+
[!] Loaded 34 modules.
78+
____ __ ____ ____
79+
(__ ) / _\ ( _ \( _ '
80+
/ _/ / \ ) / ) __/
81+
(____)\_/\_/(__\_)(__) [Version: 0.1.5]
82+
83+
[1] Poisoners [5] Parameter
84+
[2] DoS Attacks [6] Services
85+
[3] Sniffers [7] Attacks
86+
[4] Scanners [8] Sessions
87+
88+
0) Back
89+
> 6 2
90+
+-----+----------------+----------------------------+------+----------+-
91+
| | Option | Value | Type | Required |
92+
+-----+----------------+----------------------------+------+----------+-
93+
| [1] | Displayed MOTD | b4ll4stS3c FTP Server v1.4 | str | False |
94+
+-----+----------------+----------------------------+------+----------+-
95+
| [2] | Listen port | 21 | int | False |
96+
+-----+----------------+----------------------------+------+----------+-
97+
0) Back
98+
FTP Server >
99+
```
100+
Nested entries go as far as modules will. Note that right now it's 'dumb' in that, if you enter in a ton of numbers, it's going to continue dumping that out as module selection!
101+
102+
Usage Examples
103+
==
104+
List of modules accessible from the command line:
105+
```
106+
bryan@debdev:~/tools/zarp$ sudo ./zarp.py --help
107+
[!] Loaded 34 modules.
108+
____ __ ____ ____
109+
(__ ) / _\ ( _ \( _ '
110+
/ _/ / \ ) / ) __/
111+
(____)\_/\_/(__\_)(__) [Version: 0.1.5]
112+
113+
usage: zarp.py [-h] [-q FILTER] [--update] [--wap] [--ftp] [--http] [--smb]
114+
[--ssh] [--telnet] [-w] [-s] [--service-scan]
115+
116+
optional arguments:
117+
-h, --help show this help message and exit
118+
-q FILTER Generic network sniff
119+
--update Update Zarp
120+
121+
Services:
122+
--wap Wireless access point
123+
--ftp FTP server
124+
--http HTTP Server
125+
--smb SMB Service
126+
--ssh SSH Server
127+
--telnet Telnet server
128+
129+
Scanners:
130+
-w Wireless AP Scan
131+
-s Network scanner
132+
--service-scan Service scanner
133+
bryan@debdev:~/tools/zarp$
134+
```
135+
136+
Main menu when launched with the command line GUI:
137+
```
138+
bryan@devbox:~/zarp$ sudo ./zarp.py
139+
[!] Loaded 33 modules.
140+
____ __ ____ ____
141+
(__ ) / _\ ( _ \( _ '
142+
/ _/ / \ ) / ) __/
143+
(____)\_/\_/(__\_)(__)
144+
[Version 0.1.4]
145+
[1] Poisoners [5] Parameter
146+
[2] DoS Attacks [6] Services
147+
[3] Sniffers [7] Attacks
148+
[4] Scanners [8] Sessions
149+
150+
0) Back
151+
>
152+
```
153+
154+
Navigating a module is pretty simple, and there are really only a few commands to know. When in the context of a module, the command 'info' can be used to dump a help or informational string:
155+
```
156+
ARP Spoof > info
157+
---------------------------------------------------------
158+
The heart and soul of zarp. This module exploits the ARP
159+
protocol to redirect all traffic through the attacker's
160+
chosen system.
161+
162+
http://en.wikipedia.org/wiki/ARP_poison
163+
---------------------------------------------------------
164+
+-----+------------------------------------+-------+------+----------+-
165+
| | Option | Value | Type | Required |
166+
+-----+------------------------------------+-------+------+----------+-
167+
| [1] | Interval to send respoofed packets | 2 | int | False |
168+
+-----+------------------------------------+-------+------+----------+-
169+
| [2] | Address to spoof from target | None | ip | True |
170+
+-----+------------------------------------+-------+------+----------+-
171+
| [3] | Target to poison | None | ip | True |
172+
+-----+------------------------------------+-------+------+----------+-
173+
0) Back
174+
ARP Spoof >
175+
```
176+
177+
To set an option, give it the option number followed by the value:
178+
```
179+
ARP Spoof > 2 192.168.1.219
180+
```
181+
182+
If an option supports a choice list, give it the option number followed by the lowercase letter o:
183+
```
184+
HTTP Sniffer > 2 o
185+
[!] Options: ['Site Only', 'Request String', 'Request and Payload', 'Session IDs', 'Custom Regex']
186+
+-----+-----------------------------+--------------+-------+----------+-
187+
| | Option | Value | Type | Required |
188+
+-----+-----------------------------+--------------+-------+----------+-
189+
| [1] | Regex for level 5 verbosity | None | regex | False |
190+
+-----+-----------------------------+--------------+-------+----------+-
191+
| [2] | Output verbosity | 1 | int | False |
192+
+-----+-----------------------------+--------------+-------+----------+-
193+
| [3] | Address to sniff from | 192.168.1.97 | ip | False |
194+
+-----+-----------------------------+--------------+-------+----------+-
195+
0) Back
196+
HTTP Sniffer >
197+
```
198+
199+
Modules, once all required options are set, can be run by specifying a lowercase '''r'''.
200+
201+
Future/Current Development
202+
==
203+
204+
Moved to freedcamp; please send me an email if you'd like to contribute.

src/core/util.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@
2424

2525
def version():
2626
"""Zarp version"""
27-
return "0.1.5"
27+
return "0.1.6"
2828

2929

3030
def header():

0 commit comments

Comments
 (0)