Module: Msf::Ssl::CertProvider

Defined in:
lib/msf/core/cert_provider.rb

Class Method Summary collapse

Class Method Details

.rand_vars(opts = {}) ⇒ Object



7
8
9
10
11
12
13
14
15
16
17
# File 'lib/msf/core/cert_provider.rb', line 7

def self.rand_vars(opts = {})
  opts ||= {}
  opts[:cc] ||= 'US'
  opts[:st] ||= Faker::Address.state_abbr
  opts[:loc] ||= Faker::Address.city
  opts[:org] ||= Faker::Company.name
  opts[:ou] ||= Faker::Hacker.send(%w{noun verb adjective}.sample.to_sym).gsub(/\W+/,'.')
  opts[:cn] ||= opts[:org].downcase.gsub(/and/,'').gsub(/\W+/,'.') + '.' +  Faker::Internet.domain_suffix
  opts[:email] ||= "#{opts[:ou]}@#{opts[:cn]}"
  opts
end

.ssl_generate_certificate(cert_vars: {}, ksize: 2048, **opts) ⇒ String, Array

Generate a realistic-looking but obstensibly fake SSL certificate. Use Faker gem to mimic other self-signed certificates on the web to reduce the chance of sig identification by NIDS and the like.

Returns:

  • (String, String, Array)


47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
# File 'lib/msf/core/cert_provider.rb', line 47

def self.ssl_generate_certificate(cert_vars: {}, ksize: 2048, **opts)
  yr      = 24*3600*365
  vf      = opts[:not_before] || Time.at(Time.now.to_i - rand(yr * 3) - yr)
  vt      = opts[:not_after]  || Time.at(vf.to_i + (rand(4..9) * yr))
  cvars   = self.rand_vars(cert_vars)
  subject = opts[:subject]    || ssl_generate_subject(cvars)
  ctype   = opts[:cert_type]  || opts[:ca_cert].nil? ? :ca : :server
  key     = opts[:key] || OpenSSL::PKey::RSA.new(ksize){ }
  cert    = OpenSSL::X509::Certificate.new

  cert.version    = opts[:version] || 2
  cert.serial     = opts[:serial]  || (rand(0xFFFFFFFF) << 32) + rand(0xFFFFFFFF)
  cert.subject    = OpenSSL::X509::Name.parse(subject)
  cert.issuer     = opts[:ca_cert] || cert.subject
  cert.not_before = vf
  cert.not_after  = vt
  cert.public_key = key.public_key

  bconst, kuse, ekuse = case ctype
  when :ca
    ['CA:TRUE', 'cRLSign,keyCertSign']
  when :server
    ['CA:FALSE', 'digitalSignature,keyEncipherment', 'serverAuth']
  when :client
    ['CA:FALSE', 'nonRepudiation,digitalSignature,keyEncipherment', 'clientAuth,emailProtection']
  when :ocsp
    ['CA:FALSE', 'nonRepudiation,digitalSignature', 'serverAuth,OCSPSigning']
  when :tsca
    ['CA:TRUE,pathlen:0', 'cRLSign,keyCertSign']
  end

  ef = OpenSSL::X509::ExtensionFactory.new
  ef.subject_certificate = cert
  ef.issuer_certificate = cert
  cert.extensions = [
    ef.create_extension("basicConstraints", bconst, true),
    ef.create_extension("subjectKeyIdentifier", "hash")
  ]
  if kuse and !kuse.empty?
    cert.extensions << ef.create_extension("keyUsage", kuse)
  end

  if ekuse and !ekuse.empty?
    cert.extensions << ef.create_extension("extendedKeyUsage", ekuse)
  end

  cert.sign(key, OpenSSL::Digest.new('SHA256'))

  [key, cert, nil]
end

.ssl_generate_issuer(cc: 'US', org: Faker::Company.name, cn: Faker::Internet.domain_name) ⇒ Object

Not used, for API compatibility



32
33
34
35
36
37
38
# File 'lib/msf/core/cert_provider.rb', line 32

def self.ssl_generate_issuer(
  cc: 'US',
  org: Faker::Company.name,
  cn: Faker::Internet.domain_name
)
  "#{cc}/O=#{org}/CN=#{cn}"
end

.ssl_generate_subject(opts = {}) ⇒ Object



19
20
21
22
23
24
25
26
27
28
29
# File 'lib/msf/core/cert_provider.rb', line 19

def self.ssl_generate_subject(opts = {})
  opts = self.rand_vars(opts)
  subject = ""
  subject << "/C=#{opts[:cc]}" if opts[:cc]
  subject << "/ST=#{opts[:st]}" if opts[:st]
  subject << "/O=#{opts[:org]}" if opts[:org]
  subject << "/OU=#{opts[:ou]}" if opts[:ou]
  subject << "/CN=#{opts[:cn]}" if opts[:cn]
  subject << "/emailAddress=#{opts[:email]}" if opts[:email]
  subject
end