enumlocalcert.c 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216
  1. #include <windows.h>
  2. #include <wincrypt.h>
  3. #include <stdio.h>
  4. #include <stdlib.h>
  5. #include <string.h>
  6. #include "enumlocalcert.h"
  7. #include "beacon.h"
  8. #pragma comment(lib, "Crypt32.lib")
  9. #pragma comment(lib, "Advapi32.lib")
  10. //START TrustedSec BOF print code: https://github.com/trustedsec/CS-Situational-Awareness-BOF/blob/master/src/common/base.c
  11. #ifndef bufsize
  12. #define bufsize 8192
  13. #endif
  14. char *output = 0;
  15. WORD currentoutsize = 0;
  16. HANDLE trash = NULL;
  17. int bofstart();
  18. void internal_printf(const char* format, ...);
  19. void printoutput(BOOL done);
  20. int bofstart() {
  21. output = (char*)MSVCRT$calloc(bufsize, 1);
  22. currentoutsize = 0;
  23. return 1;
  24. }
  25. void internal_printf(const char* format, ...){
  26. int buffersize = 0;
  27. int transfersize = 0;
  28. char * curloc = NULL;
  29. char* intBuffer = NULL;
  30. va_list args;
  31. va_start(args, format);
  32. buffersize = MSVCRT$vsnprintf(NULL, 0, format, args);
  33. va_end(args);
  34. if (buffersize == -1) return;
  35. char* transferBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, bufsize);
  36. intBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, buffersize);
  37. va_start(args, format);
  38. MSVCRT$vsnprintf(intBuffer, buffersize, format, args);
  39. va_end(args);
  40. if(buffersize + currentoutsize < bufsize)
  41. {
  42. MSVCRT$memcpy(output+currentoutsize, intBuffer, buffersize);
  43. currentoutsize += buffersize;
  44. } else {
  45. curloc = intBuffer;
  46. while(buffersize > 0)
  47. {
  48. transfersize = bufsize - currentoutsize;
  49. if(buffersize < transfersize)
  50. {
  51. transfersize = buffersize;
  52. }
  53. MSVCRT$memcpy(output+currentoutsize, curloc, transfersize);
  54. currentoutsize += transfersize;
  55. if(currentoutsize == bufsize)
  56. {
  57. printoutput(FALSE);
  58. }
  59. MSVCRT$memset(transferBuffer, 0, transfersize);
  60. curloc += transfersize;
  61. buffersize -= transfersize;
  62. }
  63. }
  64. KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, intBuffer);
  65. KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, transferBuffer);
  66. }
  67. void printoutput(BOOL done) {
  68. char * msg = NULL;
  69. BeaconOutput(CALLBACK_OUTPUT, output, currentoutsize);
  70. currentoutsize = 0;
  71. MSVCRT$memset(output, 0, bufsize);
  72. if(done) {MSVCRT$free(output); output=NULL;}
  73. }
  74. //END TrustedSec BOF print code.
  75. BOOL printCertProperties(PCCERT_CONTEXT pCertContext) {
  76. LPWSTR pszName = NULL;
  77. DWORD dwSize;
  78. BYTE thumbprint[20];
  79. DWORD thumbprintSize = sizeof(thumbprint);
  80. WCHAR thumbprintStr[41];
  81. // Get the "Issued By" property
  82. if (!CRYPT32$CertGetNameStringW(pCertContext, CERT_NAME_SIMPLE_DISPLAY_TYPE, 0, NULL, NULL, 0)) return FALSE;
  83. dwSize = CRYPT32$CertGetNameStringW(pCertContext, CERT_NAME_SIMPLE_DISPLAY_TYPE, 0, NULL, NULL, 0);
  84. pszName = (LPWSTR)KERNEL32$LocalAlloc(LPTR, dwSize * sizeof(wchar_t));
  85. if (!pszName) return FALSE;
  86. if (!CRYPT32$CertGetNameStringW(pCertContext, CERT_NAME_SIMPLE_DISPLAY_TYPE, 0, NULL, pszName, dwSize)) return FALSE;
  87. internal_printf("\nIssued By: %ls\n", pszName);
  88. KERNEL32$LocalFree(pszName);
  89. // Get the "Thumbprint" property
  90. if (CRYPT32$CertGetCertificateContextProperty(pCertContext, CERT_SHA1_HASH_PROP_ID, thumbprint, &thumbprintSize)) {
  91. for (DWORD i = 0; i < thumbprintSize; ++i) {
  92. MSVCRT$_snwprintf_s(thumbprintStr + (i * 2), 3, 2, L"%02X", thumbprint[i]);
  93. }
  94. thumbprintStr[40] = L'\0';
  95. internal_printf("Thumbprint: %ls\n", thumbprintStr);
  96. }
  97. else {
  98. internal_printf("Failed to get thumbprint.\n");
  99. }
  100. // Get the "Friendly Name" property
  101. dwSize = 0;
  102. dwSize = CRYPT32$CertGetNameStringW(pCertContext, CERT_NAME_FRIENDLY_DISPLAY_TYPE, 0, NULL, NULL, 0);
  103. if (dwSize == 1) {
  104. internal_printf("Friendly Name: none\n");
  105. }
  106. else
  107. {
  108. pszName = (LPWSTR)KERNEL32$LocalAlloc(LPTR, dwSize * sizeof(wchar_t));
  109. if (!pszName) return FALSE;
  110. if (!CRYPT32$CertGetNameStringW(pCertContext, CERT_NAME_FRIENDLY_DISPLAY_TYPE, 0, NULL, pszName, dwSize)) return FALSE;
  111. internal_printf("Friendly Name: %ls\n", pszName);
  112. KERNEL32$LocalFree(pszName);
  113. }
  114. // Get the "Expiration Date" property
  115. SYSTEMTIME stExpirationDate;
  116. KERNEL32$FileTimeToSystemTime(&pCertContext->pCertInfo->NotAfter, &stExpirationDate);
  117. WCHAR szExpirationDate[256];
  118. KERNEL32$GetDateFormatW(LOCALE_USER_DEFAULT, 0, &stExpirationDate, L"yyyy-MM-dd", szExpirationDate, sizeof(szExpirationDate) / sizeof(WCHAR));
  119. internal_printf("Expiration Date: %ls\n", szExpirationDate);
  120. // Get the "Intended Purposes" property
  121. PCERT_ENHKEY_USAGE pUsage = NULL;
  122. DWORD dwUsageSize = 0;
  123. if (!CRYPT32$CertGetEnhancedKeyUsage(pCertContext, 0, NULL, &dwUsageSize)) return FALSE;
  124. pUsage = (PCERT_ENHKEY_USAGE)KERNEL32$LocalAlloc(LPTR, dwUsageSize);
  125. if (!pUsage) return FALSE;
  126. if (!CRYPT32$CertGetEnhancedKeyUsage(pCertContext, 0, pUsage, &dwUsageSize)) return FALSE;
  127. internal_printf("Intended Purposes:\n");
  128. for (DWORD i = 0; i < pUsage->cUsageIdentifier; ++i)
  129. {
  130. LPCSTR pszOID = pUsage->rgpszUsageIdentifier[i];
  131. PCCRYPT_OID_INFO pInfo = CRYPT32$CryptFindOIDInfo(CRYPT_OID_INFO_OID_KEY, (void*)pszOID, 0);
  132. if (pInfo)
  133. {
  134. internal_printf(" - %ls (%s)\n", pInfo->pwszName, pszOID);
  135. }
  136. else
  137. {
  138. internal_printf(" - Unknown OID: %s\n", pszOID);
  139. }
  140. }
  141. KERNEL32$LocalFree(pUsage);
  142. internal_printf("\n");
  143. return TRUE;
  144. }
  145. int go(char *args, int len) {
  146. BOOL res = NULL;
  147. WCHAR *store; // Options: ROOT, MY, TRUST, CA, USERDS, AuthRoot, Disallowed
  148. HCERTSTORE hStore = NULL;
  149. datap parser;
  150. BeaconDataParse(&parser, args, len);
  151. store = BeaconDataExtract(&parser, NULL);
  152. if(!bofstart()) return;
  153. // Open Local Computer store
  154. hStore = CRYPT32$CertOpenStore(CERT_STORE_PROV_SYSTEM_W, 0, (HCRYPTPROV)NULL, CERT_SYSTEM_STORE_LOCAL_MACHINE | CERT_STORE_OPEN_EXISTING_FLAG, store);
  155. if (!hStore) {
  156. BeaconPrintf(CALLBACK_ERROR, "Failed to open specified certificate store\n");
  157. return 1;
  158. }
  159. PCCERT_CONTEXT pCertContext = NULL;
  160. while (pCertContext = CRYPT32$CertEnumCertificatesInStore(hStore, pCertContext)) {
  161. res = printCertProperties(pCertContext);
  162. }
  163. if(!res) {
  164. BeaconPrintf(CALLBACK_ERROR, "Failed to list certificates in specified store.\n");
  165. return 0;
  166. }
  167. else {
  168. printoutput(TRUE);
  169. }
  170. if (pCertContext) CRYPT32$CertFreeCertificateContext(pCertContext);
  171. if (hStore) CRYPT32$CertCloseStore(hStore, 0);
  172. return 0;
  173. }