ヤミRoot VoidGate
User / IP
:
216.73.216.143
Host / Server
:
146.88.233.70 / dev.loger.cm
System
:
Linux hybrid1120.fr.ns.planethoster.net 3.10.0-957.21.2.el7.x86_64 #1 SMP Wed Jun 5 14:26:44 UTC 2019 x86_64
Command
|
Upload
|
Create
Mass Deface
|
Jumping
|
Symlink
|
Reverse Shell
Ping
|
Port Scan
|
DNS Lookup
|
Whois
|
Header
|
cURL
:
/
home
/
itrave
/
pki_dir
/
root
/
Viewing: openssl.cnf
[ca] default_ca = CA_default [ CA_default ] # Directory and file locations. dir = /home/itrave/pki_dir/root name = root certs = $dir/certs crl_dir = $dir/crl new_certs_dir = $certs database = $dir/index.txt serial = $dir/serial RANDFILE = $dir/.rand # The root key and root certificate. private_key = $dir/$name.key.pem certificate = $dir/$name.cert.pem # For certificate revocation lists. crlnumber = $dir/crlnumber crl = $dir/crl/$name.crl.pem crl_extensions = crl_ext default_crl_days = 7 # SHA-1 is deprecated, so use SHA-2 instead. default_md = sha256 name_opt = ca_default cert_opt = ca_default default_days = 36500 preserve = no policy = policy_strict [ policy_strict ] countryName = match stateOrProvinceName = match localityName = optional organizationName = match organizationalUnitName = optional commonName = supplied emailAddress = optional [ req ] default_bits = 4096 distinguished_name = req_distinguished_name string_mask = utf8only default_md = sha256 # Extension to add when the -x509 option is used. x509_extensions = v3_ca prompt = no [ req_distinguished_name ] C=CM ST=Center L=Yde O=E-Travel OU=Development CN=Etravel Root CA ### ### Extensions ### ### For CA [ v3_ca ] subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always,issuer basicConstraints = critical, CA:true keyUsage = critical, digitalSignature, cRLSign, keyCertSign ### For Intermediate CA [ v3_intermediate_ca ] subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always,issuer basicConstraints = critical, CA:true, pathlen:3 keyUsage = critical, digitalSignature, cRLSign, keyCertSign ### For server certificates (API Cert) [ server_cert ] basicConstraints = CA:FALSE nsCertType = server nsComment = "OpenSSL Generated Server Certificate" subjectKeyIdentifier = hash authorityKeyIdentifier = keyid,issuer:always keyUsage = critical, digitalSignature, keyEncipherment extendedKeyUsage = serverAuth ### For CRLs [ crl_ext ] authorityKeyIdentifier=keyid:always ### For OCSP certificates [ ocsp ] basicConstraints = CA:FALSE subjectKeyIdentifier = hash authorityKeyIdentifier = keyid,issuer keyUsage = critical, digitalSignature extendedKeyUsage = critical, OCSPSigning
Coded With 💗 by
0x6ick