Closed M3redi7hEmmy closed 1 year ago
Sorry, I haven't tested it on version 6.x yet. I might look into it in my spare time. You can also refer to the article to try to analyze the license verification logic and submit contributions to this repository.
I've read another article from your blog: https://wzt.ac.cn/2023/05/29/CVE-2023-25610/
It seems like you test that vulnerability on version 6.x. So did you debug with an Evaluate VM or a Physical Device
The VM I debugged has a real valid license which is not generated by this tool.
Lol 🤣🤣🤣 0k than. Thx again for sharing
I tried to upload the generated license on my Fortigate 6.0.16 running on Vmware. But I can only get the Evaluation License which is not support Https and SSL-VPN :( So have you try the generated license on any Fortigate VM 6.x.x? Or is there any way to generated a valid license? Thanks a lot man <3
The system info given below: Version: FortiGate-VM64 v6.0.16,build0505,221215 (GA) Virus-DB: 1.00000(2018-04-09 18:07) Extended DB: 1.00000(2018-04-09 18:07) Extreme DB: 1.00000(2018-04-09 18:07) IPS-DB: 6.00741(2015-12-01 02:30) IPS-ETDB: 0.00000(2001-01-01 00:00) APP-DB: 6.00741(2015-12-01 02:30) INDUSTRIAL-DB: 6.00741(2015-12-01 02:30) Serial-Number: FGVMEVZBP1BD-7D4 IPS Malicious URL Database: 1.00001(2015-01-01 01:01) Botnet DB: 1.00000(2012-05-28 22:51) License Status: Valid Evaluation License Expires: Tue Jul 11 18:15:18 2023 VM Resources: 1 CPU/1 allowed, 1003 MB RAM/1024 MB allowed BIOS version: 04000002 Log hard disk: Available Hostname: FortiGate-VM64 Operation Mode: NAT Current virtual domain: root Max number of virtual domains: 1 Virtual domains status: 1 in NAT mode, 0 in TP mode Virtual domain configuration: disable FIPS-CC mode: disable Current HA mode: standalone Branch point: 0505 Release Version Information: GA FortiOS x86-64: Yes System time: Tue Jun 27 04:05:34 2023