Skip to content

Latest commit

 

History

History
46 lines (33 loc) · 908 Bytes

README.md

File metadata and controls

46 lines (33 loc) · 908 Bytes

You will need the following python modules: m2crypto, signxml, defusedxml

Running the POC:

Mitm script

python3 mitm.py

press enter to start on port 8081 (or specify a different port)

Server

In a second terminal, start the server

cd wsseCriticalImpl

./wssedemo sne 8080

Options:

  • s: server
  • n: normalized XML
  • e: encryption
  • g: don't sign the X509 cert (needed for a no-ceo attack)

Client

In a third terminal, start the client (connect to the port you started the mitm on, 8081 by default)

cd wsseCriticalImpl

./wssedemo ne 8081

Options:

  • n: normalized XML
  • e: encryption
  • g: don't sign the X509 cert (needed for a no-ceo attack)

gSOAP's wssedemo

Alternatively, you can run the original wsse example from gSOAP. In this case, use python3 mitmOriginalWsse.py

Run the original wssedemo in the same setup as explained above.