Skip to content

Proof of concept for an attack found by Jackson et. al. in "Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures"

Notifications You must be signed in to change notification settings

FallenHero66/uncertified-poc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

You will need the following python modules: m2crypto, signxml, defusedxml

Running the POC:

Mitm script

python3 mitm.py

press enter to start on port 8081 (or specify a different port)

Server

In a second terminal, start the server

cd wsseCriticalImpl

./wssedemo sne 8080

Options:

  • s: server
  • n: normalized XML
  • e: encryption
  • g: don't sign the X509 cert (needed for a no-ceo attack)

Client

In a third terminal, start the client (connect to the port you started the mitm on, 8081 by default)

cd wsseCriticalImpl

./wssedemo ne 8081

Options:

  • n: normalized XML
  • e: encryption
  • g: don't sign the X509 cert (needed for a no-ceo attack)

gSOAP's wssedemo

Alternatively, you can run the original wsse example from gSOAP. In this case, use python3 mitmOriginalWsse.py

Run the original wssedemo in the same setup as explained above.

About

Proof of concept for an attack found by Jackson et. al. in "Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures"

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published