new: spoofing godaddy ca

This commit is contained in:
evilsocket 2018-01-14 20:19:52 +01:00
parent 21b8b4527f
commit 5c2dc44a2d
2 changed files with 7 additions and 5 deletions

View file

@ -32,12 +32,12 @@ func NewHttpsProxy(s *session.Session) *HttpsProxy {
"Port to bind the HTTPS proxy to."))
p.AddParam(session.NewStringParameter("https.proxy.certificate",
"~/.bcap-https.proxy-ca.certificate.pem",
"~/.bettercap-ca.cert.pem",
"",
"HTTPS proxy certification authority TLS certificate file."))
p.AddParam(session.NewStringParameter("https.proxy.key",
"~/.bcap-https.proxy-ca.key.pem",
"~/.bettercap-ca.key.pem",
"",
"HTTPS proxy certification authority TLS key file."))

View file

@ -41,9 +41,11 @@ func Generate(certPath string, keyPath string) error {
template := x509.Certificate{
SerialNumber: serialNumber,
Subject: pkix.Name{
CommonName: "www.cisco.com",
Organization: []string{"Cisco Systems, Inc."},
OrganizationalUnit: []string{"Cisco Systems, Inc."},
Country: []string{"US"},
Locality: []string{"Scottsdale"},
Organization: []string{"GoDaddy.com, Inc."},
OrganizationalUnit: []string{"http://certs.godaddy.com/repository/"},
CommonName: "Go Daddy Secure Certificate Authority - G2",
},
NotBefore: notBefore,
NotAfter: notAfter,