Submit Search
Upload
Openssl
•
Download as PPTX, PDF
•
1 like
•
212 views
A
Adam Moravcik
Follow
Presentation with basic commands to use OpenSSL
Read less
Read more
Software
Report
Share
Report
Share
1 of 48
Download now
Recommended
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
Santiago Bassett
Vault - Secret and Key Management
Vault - Secret and Key Management
Anthony Ikeda
HashiCorp's Vault - The Examples
HashiCorp's Vault - The Examples
Michał Czeraszkiewicz
BSides Roma 2018 - Red team techniques
BSides Roma 2018 - Red team techniques
Guglielmo Scaiola
Hiding secrets in Vault
Hiding secrets in Vault
Neven Rakonić
My Bro The ELK
My Bro The ELK
Tripwire
Engineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the Cloud
randomuserid
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat Security Conference
Recommended
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
Santiago Bassett
Vault - Secret and Key Management
Vault - Secret and Key Management
Anthony Ikeda
HashiCorp's Vault - The Examples
HashiCorp's Vault - The Examples
Michał Czeraszkiewicz
BSides Roma 2018 - Red team techniques
BSides Roma 2018 - Red team techniques
Guglielmo Scaiola
Hiding secrets in Vault
Hiding secrets in Vault
Neven Rakonić
My Bro The ELK
My Bro The ELK
Tripwire
Engineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the Cloud
randomuserid
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat Security Conference
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
wremes
Ad, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniques
Guglielmo Scaiola
Securing Hadoop with OSSEC
Securing Hadoop with OSSEC
Vic Hargrave
HashiCorp Vault Workshop:幫 Credentials 找個窩
HashiCorp Vault Workshop:幫 Credentials 找個窩
smalltown
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
RootedCON
Fosdem10
Fosdem10
wremes
ModSecurity and NGINX: Tuning the OWASP Core Rule Set
ModSecurity and NGINX: Tuning the OWASP Core Rule Set
NGINX, Inc.
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]
RootedCON
Owin e o Projeto Katana
Owin e o Projeto Katana
Andre Carlucci
Android Recoverable Keystore
Android Recoverable Keystore
Nikolay Elenkov
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
clevernetsystemsgeneva
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
PROIDEA
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA
NGINX, Inc.
Nagios Conference 2013 - Spenser Reinhardt - Securing Your Nagios Server
Nagios Conference 2013 - Spenser Reinhardt - Securing Your Nagios Server
Nagios
Getting started with RDO Havana
Getting started with RDO Havana
Dan Radez
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
Igor Beliaiev
IstSec'14 - Onur ALANBEL - ShellShock
IstSec'14 - Onur ALANBEL - ShellShock
BGA Cyber Security
Da APK al Golden Ticket
Da APK al Golden Ticket
Giuseppe Trotta
IPv6 for Pentesters
IPv6 for Pentesters
NotSoSecure Global Services
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)
Javier Junquera
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
CODE BLUE
Alfresco Certificates
Alfresco Certificates
Angel Borroy López
More Related Content
What's hot
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
wremes
Ad, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniques
Guglielmo Scaiola
Securing Hadoop with OSSEC
Securing Hadoop with OSSEC
Vic Hargrave
HashiCorp Vault Workshop:幫 Credentials 找個窩
HashiCorp Vault Workshop:幫 Credentials 找個窩
smalltown
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
RootedCON
Fosdem10
Fosdem10
wremes
ModSecurity and NGINX: Tuning the OWASP Core Rule Set
ModSecurity and NGINX: Tuning the OWASP Core Rule Set
NGINX, Inc.
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]
RootedCON
Owin e o Projeto Katana
Owin e o Projeto Katana
Andre Carlucci
Android Recoverable Keystore
Android Recoverable Keystore
Nikolay Elenkov
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
clevernetsystemsgeneva
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
PROIDEA
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA
NGINX, Inc.
Nagios Conference 2013 - Spenser Reinhardt - Securing Your Nagios Server
Nagios Conference 2013 - Spenser Reinhardt - Securing Your Nagios Server
Nagios
Getting started with RDO Havana
Getting started with RDO Havana
Dan Radez
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
Igor Beliaiev
IstSec'14 - Onur ALANBEL - ShellShock
IstSec'14 - Onur ALANBEL - ShellShock
BGA Cyber Security
Da APK al Golden Ticket
Da APK al Golden Ticket
Giuseppe Trotta
IPv6 for Pentesters
IPv6 for Pentesters
NotSoSecure Global Services
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)
Javier Junquera
What's hot
(20)
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
Ad, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniques
Securing Hadoop with OSSEC
Securing Hadoop with OSSEC
HashiCorp Vault Workshop:幫 Credentials 找個窩
HashiCorp Vault Workshop:幫 Credentials 找個窩
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Fosdem10
Fosdem10
ModSecurity and NGINX: Tuning the OWASP Core Rule Set
ModSecurity and NGINX: Tuning the OWASP Core Rule Set
Carlos García - Pentesting Active Directory Forests [rooted2019]
Carlos García - Pentesting Active Directory Forests [rooted2019]
Owin e o Projeto Katana
Owin e o Projeto Katana
Android Recoverable Keystore
Android Recoverable Keystore
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA
Nagios Conference 2013 - Spenser Reinhardt - Securing Your Nagios Server
Nagios Conference 2013 - Spenser Reinhardt - Securing Your Nagios Server
Getting started with RDO Havana
Getting started with RDO Havana
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
IstSec'14 - Onur ALANBEL - ShellShock
IstSec'14 - Onur ALANBEL - ShellShock
Da APK al Golden Ticket
Da APK al Golden Ticket
IPv6 for Pentesters
IPv6 for Pentesters
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)
Similar to Openssl
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
CODE BLUE
Alfresco Certificates
Alfresco Certificates
Angel Borroy López
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
Chris Gates
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
Felipe Prado
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
Andrew Case
Basics of ssl
Basics of ssl
n|u - The Open Security Community
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ Infosectrain
InfosecTrain
hacking-embedded-devices.pptx
hacking-embedded-devices.pptx
ssuserfcf43f
RING 0/-2 ROOKITS : COMPROMISING DEFENSES
RING 0/-2 ROOKITS : COMPROMISING DEFENSES
Priyanka Aash
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
Jisc
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
Jimmy Chang
Ring 0/-2 Rootkits: bypassing defenses -- DEF CON 2018 USA
Ring 0/-2 Rootkits: bypassing defenses -- DEF CON 2018 USA
Alexandre Borges
Drupalcon2007 Sun
Drupalcon2007 Sun
smattoon
Beyond the Query: A Cassandra + Solr + Spark Love Triangle Using Datastax Ent...
Beyond the Query: A Cassandra + Solr + Spark Love Triangle Using Datastax Ent...
DataStax Academy
Creating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server Hardening
archwisp
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
qqlan
Android application security testing
Android application security testing
Mykhailo Antonishyn
Beyond the Query – Bringing Complex Access Patterns to NoSQL with DataStax - ...
Beyond the Query – Bringing Complex Access Patterns to NoSQL with DataStax - ...
StampedeCon
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Cyber Security Alliance
A Cassandra + Solr + Spark Love Triangle Using DataStax Enterprise
A Cassandra + Solr + Spark Love Triangle Using DataStax Enterprise
Patrick McFadin
Similar to Openssl
(20)
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
Alfresco Certificates
Alfresco Certificates
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
Basics of ssl
Basics of ssl
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ Infosectrain
hacking-embedded-devices.pptx
hacking-embedded-devices.pptx
RING 0/-2 ROOKITS : COMPROMISING DEFENSES
RING 0/-2 ROOKITS : COMPROMISING DEFENSES
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
Ring 0/-2 Rootkits: bypassing defenses -- DEF CON 2018 USA
Ring 0/-2 Rootkits: bypassing defenses -- DEF CON 2018 USA
Drupalcon2007 Sun
Drupalcon2007 Sun
Beyond the Query: A Cassandra + Solr + Spark Love Triangle Using Datastax Ent...
Beyond the Query: A Cassandra + Solr + Spark Love Triangle Using Datastax Ent...
Creating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server Hardening
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
Android application security testing
Android application security testing
Beyond the Query – Bringing Complex Access Patterns to NoSQL with DataStax - ...
Beyond the Query – Bringing Complex Access Patterns to NoSQL with DataStax - ...
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
A Cassandra + Solr + Spark Love Triangle Using DataStax Enterprise
A Cassandra + Solr + Spark Love Triangle Using DataStax Enterprise
Recently uploaded
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
joe51371421
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
kotipi9215
EY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
Neo4j
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
bodapatigopi8531
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
VICTOR MAESTRE RAMIREZ
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
aditisharan08
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
BradBedford3
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
ICS
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
kellynguyen01
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
aagamshah0812
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
gurkirankumar98700
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
shikhaohhpro
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
Evangelist Apps https://twitter.com/EvangelistSW/
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Christina Lin
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
OnePlan Solutions
What is Binary Language? Computer Number Systems
What is Binary Language? Computer Number Systems
JheuzeDellosa
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
MyIntelliSource, Inc.
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Alberto González Trastoy
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
Wave PLM
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
kalichargn70th171
Recently uploaded
(20)
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
EY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
What is Binary Language? Computer Number Systems
What is Binary Language? Computer Number Systems
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Openssl
1.
Adam Moravcik
2.
cybrary.it/course/cryptography/ pluralsight.com/library/courses/cryptography-big-picture
3.
http://cmder.net https://slproweb.com/products/Win32OpenSSL.html
4.
• SHA-2 https://en.wikipedia.org/wiki/SHA-2 • RSA
Ron Rivest Adi Shamir LeonardAdleman https://simple.wikipedia.org/wiki/RSA_(algorithm) • AES https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
5.
6.
7.
8.
9.
openssl.org msdn.microsoft.com/en-us/library/aa380256.aspx developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS
10.
11.
https://wiki.openssl.org/index.php/Manual:Dgst(1)
12.
openssl dgst -sha512
my_file.txt
13.
openssl passwd -1
-salt thisismysalt123ThePassword1234567890
14.
openssl genrsa -out
private.pem openssl rsa -in private.pem -outform PEM -pubout -out public.pem openssl dgst -sha512 -sign private.pem -out signature.sign my_file.txt openssl dgst -sha512 -verify public.pem -signature signature.sign my_file.txt
15.
16.
openssl aes-256-cbc -e
-in my_file.txt -out my_file_encrypted.enc openssl aes-256-cbc -d -in my_file_encrypted.enc -out my_file_DEcrypted.txt
17.
18.
19.
20.
openssl rand -base64
128 -out key.bin openssl enc -aes-256-cbc -salt -in my_file.txt -out my_file.txt.enc -pass file:./key.bin openssl rsautl -encrypt -inkey public.pem -pubin -in key.bin -out key.bin.enc openssl rsautl -decrypt -inkey private.pem -in key.bin.enc -out decrypted_key.bin openssl enc -d -aes-256-cbc -in my_file.txt.enc -out decrypted_my_file.txt -pass file:./decrypted_key.bin
21.
22.
23.
24.
25.
https://wiki.openssl.org/index.php/Manual:Genrsa(1)
26.
openssl genrsa -aes256
-out private.pem
27.
openssl genrsa -out
private1.pem
28.
https://wiki.openssl.org/index.php/Manual:Rsa(1)
29.
openssl rsa -in
private.pem -outform PEM -pubout -out public.pem
30.
openssl rsa -in
private.pem -out private_unencrypted.pem -outform PEM
31.
https://wiki.openssl.org/index.php/Manual:Req(1)
32.
openssl req -new
-sha256 -key private_key.pem -out request_to_sign_by_ca.csr
33.
openssl req -noout
-text -in request_to_sign_by_ca.csr
34.
openssl req -x509
-newkey rsa:2048 -keyout private_key.pem -out cert.cer -days 365 openssl req -x509 -newkey rsa:2048 -keyout private_key.pem -out cert.cer -days 365 -nodes
35.
36.
https://wiki.openssl.org/index.php/Manual:X509(1)
37.
openssl genrsa -out
MyRootCA.key 2048 openssl req -x509 -new -nodes -key MyRootCA.key -sha256 -days 1024 -out MyRootCA.pem openssl x509 -outform der -in MyRootCA.pem -out MyRootCA.crt • Import CA to certificate trusted Root certs
38.
39.
openssl genrsa -out
MyClient1.key 2048 openssl req -new -key MyClient1.key -out MyClient1.csr openssl x509 -req -in MyClient1.csr -CA MyRootCA.pem -CAkey MyRootCA.key -CAcreateserial -out MyClient1.pem -days 1024 -sha256 openssl x509 -outform der -in MyClient1.pem -out MyClient1.crt
40.
41.
42.
openssl x509 -noout
-text -in device.crt
43.
44.
45.
openssl genrsa -out
MyClient1.key 2048 openssl req -new -key MyClient1.key -sha512 -nodes -out MyClient1.csr -config req.cfg openssl x509 -req -in MyClient1.csr -CA MyRootCA.pem -CAkey MyRootCA.key -out MyClient1.pem -days 1024 -sha512 -extfile req.cfg -extensions req_ext openssl x509 -outform der -in MyClient1.pem -out MyClient1.crt openssl pkcs12 -export -out example.com.pfx -inkey MyClient1.key -in MyClient1.pem
46.
47.
openssl genrsa -out
MyClient2.key 2048 openssl req -new -key MyClient2.key -sha512 -nodes -out MyClient2.csr openssl x509 -req -in MyClient2.csr -CA MyRootCA.pem -CAkey MyRootCA.key -out MyClient2.pem -days 1024 -sha512 openssl x509 -outform der -in MyClient2.pem -out MyClient2.crt openssl pkcs12 -export -out amvc.pfx -inkey MyClient2.key -in MyClient2.pem
Editor's Notes
Create cfg file [ req ] distinguished_name = req_distinguished_name req_extensions = req_ext [ req_distinguished_name ] commonName = Common Name (e.g. server FQDN or YOUR name) [ req_ext ] subjectAltName = @alt_names [alt_names] DNS.1 = www.example.com DNS.2 = example.com DNS.3 = *.example.com
Download now