No More Yukinoshita 47. I'm Done

If You Found Every Social Media Platform Using "Yukinoshita 47" Name That's The Other Guy.

Copyright © Yukinoshita 47 | Published By Gooyaabi Templates | Powered By Blogger
Design by WebSuccessAgency | Blogger Theme by NewBloggerThemes.com | BTheme.net

My Motivation

My Motivation

Blog Archive



Seal

Always Trust Yourself And Use Your Opportunity



Jumat, 24 Mei 2019

ROC - Infineon RSA Vulnerability

Alat ini terkait dengan makalah konferensi ACM CCS 2017 # 124 Kembalinya Serangan Coppersmith: Faktorisasi Praktis RSA Moduli yang Banyak Digunakan.

Ini memungkinkan Anda untuk menguji kunci RSA publik untuk keberadaan kerentanan yang dijelaskan.

Pembaruan: Makalah serangan sudah online, versi ACM.

Saat ini alat mendukung format kunci berikut:

  • X509 Certificate, DER encoded, one per file, *.der, *.crt
  • X509 Certificate, PEM encoded, more per file, *.pem
  • RSA PEM encoded private key, public key, more per file, *.pem (has to have correct header -----BEGIN RSA...)
  • SSH public key, *.pub, starting with "ssh-rsa", one per line
  • ASC encoded PGP key, *.pgp, *.asc. More per file, has to have correct header -----BEGIN PGP...
  • APK android application, *.apk
  • one modulus per line text file *.txt, modulus can be a) base64 encoded number, b) hex coded number, c) decimal coded number
  • JSON file with moduli, one record per line, record with modulus has key "mod" (int, base64, hex, dec encoding supported) certificate(s) with key "cert" / array of certificates with key "certs" are supported, base64 encoded DER.
  • LDIFF file - LDAP database dump. Any field ending with ";binary::" is attempted to decode as X509 certificate
  • Java Key Store file (JKS). Tries empty password & some common, specify more with --jks-pass-file
  • PKCS7 signature with user certificate

Download : https://github.com/crocs-muni/roca



Share: