certutil

Query Certificates for SHA1 / SHA2 / SHA256

北慕城南 提交于 2021-02-08 10:26:02
问题 I know we can do this in PowerShell. (Get-ChildItem Cert:\Currentuser\My\ | Select -Property SignatureAlgorithm -ExpandProperty SignatureAlgorithm).FriendlyName Results: sha256RSA sha256RSA Ref.. https://blogs.technet.microsoft.com/poshchap/2017/10/20/one-liner-get-signing-algorithm-for-personal-store-certificates/ However, corporate will not allow us to run PowerShell in the field. I can run the following and get the certs installed for the Intermediate and Root Stores. certutil -store CA

Query Certificates for SHA1 / SHA2 / SHA256

落爺英雄遲暮 提交于 2021-02-08 10:24:09
问题 I know we can do this in PowerShell. (Get-ChildItem Cert:\Currentuser\My\ | Select -Property SignatureAlgorithm -ExpandProperty SignatureAlgorithm).FriendlyName Results: sha256RSA sha256RSA Ref.. https://blogs.technet.microsoft.com/poshchap/2017/10/20/one-liner-get-signing-algorithm-for-personal-store-certificates/ However, corporate will not allow us to run PowerShell in the field. I can run the following and get the certs installed for the Intermediate and Root Stores. certutil -store CA

Storing large file within batch file

被刻印的时光 ゝ 提交于 2020-01-07 07:49:23
问题 I'm trying to create a batch file that stores one or more large files within it as base64 encoded strings, then converts them back into files. I've been following the first answer on this question: Store a file inside of a batch file? but i'm trying to store a ~3mb file within this batch file, and when it comes to writing the files source back to a file (via echo), the batch file appears to crash. I get a popup saying 'Windows Command Processor has stopped working'. Is there a limit to how

Compare files from two folders using HASH SHA1 in BATCH

一世执手 提交于 2019-12-10 10:37:51
问题 I have this batch code but it is wrong, what I need is to see on screen the name of the files in folder2 that are not in folder1 comparing them with your HASH SHA1. Temporary files are in the same directory. I appreciate your comments @echo off cd folder1 FOR /F "Delims=" %%A in ('DIR /B/A-D *.*') DO ( certUtil -hashfile "%%A" SHA1 | findstr /VI "HASH"| findstr /VI "certutil" ) >>folder2\output.tmp cd folder2 FOR /F "Delims=" %%B in ('DIR /B/A-D *.* ^|Findstr /VEIL ".tmp"') DO ( certUtil

Automate export x509 certificate w/chain from Server 2008 R2 to a p7b file WITHOUT external tools?

霸气de小男生 提交于 2019-12-06 08:59:47
问题 I manage the Domain Controllers centrally, but the site admins manage their own digital senders locally. I can easily export an X509 certificate (private key not needed) with the whole chain from a Windows Server 2008 R2 Domain Controller to a p7b file through the wizard: ~~~~~~~~~~~~~~~~~ ...5. The Certificate Export Wizard opens. Click Next. In the Export File Format dialog box, do the following: a. Select Cryptographic Message Syntax Standard – PKCS #7 Certificates (.P7B). b. Check Include

Compare files from two folders using HASH SHA1 in BATCH

懵懂的女人 提交于 2019-12-06 04:39:28
I have this batch code but it is wrong, what I need is to see on screen the name of the files in folder2 that are not in folder1 comparing them with your HASH SHA1. Temporary files are in the same directory. I appreciate your comments @echo off cd folder1 FOR /F "Delims=" %%A in ('DIR /B/A-D *.*') DO ( certUtil -hashfile "%%A" SHA1 | findstr /VI "HASH"| findstr /VI "certutil" ) >>folder2\output.tmp cd folder2 FOR /F "Delims=" %%B in ('DIR /B/A-D *.* ^|Findstr /VEIL ".tmp"') DO ( certUtil -hashfile "%%B" SHA1 | findstr /VI "HASH"| findstr /VI "certutil" >>output2.tmp FOR /F "Delims=" %%C in (

Automate export x509 certificate w/chain from Server 2008 R2 to a p7b file WITHOUT external tools?

▼魔方 西西 提交于 2019-12-04 12:17:29
I manage the Domain Controllers centrally, but the site admins manage their own digital senders locally. I can easily export an X509 certificate (private key not needed) with the whole chain from a Windows Server 2008 R2 Domain Controller to a p7b file through the wizard: ~~~~~~~~~~~~~~~~~ ...5. The Certificate Export Wizard opens. Click Next. In the Export File Format dialog box, do the following: a. Select Cryptographic Message Syntax Standard – PKCS #7 Certificates (.P7B). b. Check Include all certificates in the certification path if possible. c. Click Next. In the File to Export dialog

Import pfx file into particular certificate store from command line

北战南征 提交于 2019-12-03 02:18:31
问题 It's relatively easy to import a certificate into the user's personal store from a pfx file by using CertUtil: certutil –f –p [certificate_password] –importpfx C:\[certificate_path_and_name].pfx But this ends up in the Personal Store of the current user. I need it in TrustedPeople on LocalMachine. Is there any way I can do this from the command line, either by calling different arguments on certutil importpfx, using another certutil command or a different utility? Powershell is another

Import pfx file into particular certificate store from command line

自作多情 提交于 2019-12-02 15:48:36
It's relatively easy to import a certificate into the user's personal store from a pfx file by using CertUtil: certutil –f –p [certificate_password] –importpfx C:\[certificate_path_and_name].pfx But this ends up in the Personal Store of the current user. I need it in TrustedPeople on LocalMachine. Is there any way I can do this from the command line, either by calling different arguments on certutil importpfx, using another certutil command or a different utility? Powershell is another possibility, although I don't know much about it. Cheers, Matt Anchoring my findings here for future readers.

Dart HTTP Server and importing a SSL Certificate

点点圈 提交于 2019-12-01 19:39:10
I have create a Dart HTTP(s) server for deploying files. I can have it run the https with a self signed cert. But how do you import a .crt properly from someone for example GoDaddy properly? ptDave So after a long struggle I have finally succeeded in importing a certificate from GoDaddy properly into Darts HttpServer bindSecure. In order to pull this off, first you must merge your key and the certificate from GoDaddy together. This can be done using a variation of this: openssl pkcs12 -export -in website_cert.crt -inkey website_key.key -out website.p12 -name Name-Of-Cert -passout pass:SECRET