Skip to content

jeanlucdupont/EXEfromCER

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

EXEfromCER

This is a proof of concept to deliver a binary payload via an X.509 TLS certificate. It embeds a full Windows executable inside a custom extension of an X.509 certificate and serves it via HTTPS. The client extracts the payload from the certificate and executes it.

  1. Generate a certificate with a custom OID extension containing your binary. (openssl req -new -x509 -days 365 -config cert.ini -keyout srkey.pem -out srcert.pem -nodes)
  2. Serve it over TLS (e.g., with OpenSSL).
  3. Python client connects to the SSL server, extracts the binary, writes it to disk, and runs it.
image

About

PoC that downloads an executable from a public SSL certificate

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages