{"id":1610,"date":"2009-04-10T19:08:56","date_gmt":"2009-04-10T17:08:56","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/"},"modified":"2009-04-10T19:08:56","modified_gmt":"2009-04-10T17:08:56","slug":"free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/","title":{"rendered":"Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates"},"content":{"rendered":"<p>In <a href=\"\/index.php\/2008\/07\/14\/windows-2008-pki-certificate-authority-ad-cs-basics\/\" target=\"_blank\" rel=\"noopener\">one of my earlier posts<\/a>, I have talked about setting up a Windows 2008 based Certificate Authority\/PKI. Once your Windows 2008 CA setup is in place and configured, you can go ahead and starting issuing certificates. But at the same time, you need to put a maintenance\/management procedure in place so you can stay on top of certain tasks, such as processing pending certificate requests or identify certificates that will expire and need manual renewal.&#160; Unfortunately there is no easy way to get notified when new requests are pending, or certificates will expire somewhere in the future.<\/p>\n<p>I wrote a small script that will help you putting in place this maintenance process.<\/p>\n<p>This free utility requires .Net framework and requires proper permissions to connect to the CA admin interface.&#160; It uses the Windows Server 2003, 2008 or Vista version of certutil and will run against a 2003 or 2008 CA.<\/p>\n<p>The tool will perform the following tasks<\/p>\n<p>- list all pending certificate requests<\/p>\n<p>- list all certificates that will expire in a given number of days (or have expired in the last x days)<\/p>\n<p>You can configure the tool to send you an email based on the results of these 2 queries.&#160;&#160; What I usually do is run this script in 2 separate schedules :<\/p>\n<p>- look for pending requests, run script every day<\/p>\n<p>- look for certificates that will expire in the next x days, and run script on a weekly basis.<\/p>\n<p>Of course, you are free to schedule the script the way you want.<\/p>\n<h3>Usage<\/h3>\n<p>After unpacking the zip file, you will get a single .exe file.&#160; After launching the tool without specifying any parameters, you will get this :<\/p>\n<pre style=\"border-right: #cecece 1px solid; padding-right: 5px; border-top: #cecece 1px solid; padding-left: 5px; min-height: 40px; padding-bottom: 5px; overflow: auto; border-left: #cecece 1px solid; width: 650px; padding-top: 5px; border-bottom: #cecece 1px solid; background-color: #f0f0f0\"> ---------------------------------------\n  PVE CA Cert List Utility - (c) 2009\n  List pending requests and expirations\n  http:<span style=\"color: #008000\">\/\/www.corelan.be:8800<\/span>\n  Version : 1.0.0.58\n ---------------------------------------\n   Usage :\n\n   pvecacertlist.exe parameters\n\n   Parameters :\n     -h    Show this help text. All other options will be ignored\n     -s &lt;CAServer\\CAName&gt; optional, only used when CA is not running\n                            on the local machine)\n     -e &lt;Nr of days&gt; Show list of certificates that will expire in less\n                      than &lt;Nr of days&gt; days\n     -p    Show list of pending certificate requests\n       Note : you must specify at least option -e or option -p.\n              Otherwise, there won't be any output\n     -i &lt;templateName&gt;\n           Only show certificates from the specified certificate template\n           defined here (max. 1 template)\n     -v    Verbose - show verbose output\n     -n    notify - send email with report.\n           This option requires a valid config file. By <span style=\"color: #0000ff\">default<\/span>, the\n           utility will search <span style=\"color: #0000ff\">for<\/span> a file called smtp.cfg.\n           This file must contain the following entries :\n               mailserver=&lt;hostname or IP of mailserver&gt;\n               mailserverport=&lt;port to connect to on mailserver\n               mailfrom=&lt;email address&gt;\n               mailto=&lt;email address&gt;\n           You can specify multiple To: addresses by separating the\n           addresses with a comma\n     -c &lt;path to custom smtp config file&gt;   This parameter allows you\n           to specify the path\/filename to a custom smtp config file\n     -o    Only send email when action is required. Used only with -n\n     -f &lt;path to report file&gt;   Use this parameter to specify a path\/filename\n           where the utility output report needs to be written to\n           If this parameter is not used, the report will be written into\n           a file called report.txt in the working directory\n     -b    Don't <span style=\"color: #0000ff\">write<\/span> anything to <span style=\"color: #0000ff\">log<\/span>\/report files\n     -u    Check <span style=\"color: #0000ff\">for<\/span> updates)<\/pre>\n<p>&#160;<\/p>\n<p>Let\u2019s have a look at some of the parameters :<\/p>\n<p>-s : if you run the utility on the CA server itself, you don\u2019t need to specify the \u2013s parameter.&#160; If you are running the utility from a remote machine, you need to specify the CA Servername\\CA name using the \u2013s parameter. You can get the exact CA Servername\\CA name string by running&#160; \u201ccertutil\u201d on the CA server, look for \u201cConfig:\u201d.&#160; This is the string you need to use. (Put the string between double quotes if it contains spaces)<\/p>\n<p>-e : if you want to look for certificates that will expire in a given number of days, specify the \u2013e parameter, followed by the number of days that you want to look ahead. You can use a negative value to look back in time (to list certificates that have expired)<\/p>\n<p>-p : If you want to look for pending certificate requests, specify the \u2013p parameter.<\/p>\n<p>You can use \u2013e and \u2013p at the same time. The tool will perform both queries in the same run.<\/p>\n<p>The \u2013v parameter will show verbose output when running the script.<\/p>\n<p>-i : only show certificates that match with the specified templatename. You can only provide one template name.<\/p>\n<p>-n : Notify.&#160; If you want to send emails, you need to create a file called smtp.cfg first. This file needs to contain 4 entries (as indicated above).&#160;&#160; If you only use the \u2013n parameter, you will get an email every time, regardless whether pending requests \/ certificates that will expire are found. This file needs to be in the application directory or in the working directory. In order for mail notification to work, a valid smtp configuration file must exist. You can either create a file called smtp.cfg (in the working directory), or you can specify a custom Mysmtp.cfg file (any path\/name will work) by using the -c parameter.<\/p>\n<p>-o : This parameter can only be used when \u2013n is used as well. It will force the tool to only send emails when actions need to be taken (pending requests, or certificates that will expire)<\/p>\n<p>-u : check for update.&#160; If you enable this option, and enable email notification (-n) as well, the report will contain a note if an updated version is detected.<\/p>\n<p>By default, output will be written into a file called report.txt (in working directory).&#160; If you don't want to write anything to a local file, use the -b parameter.&#160; If you want to specify a custom path\/filename to write the report into, use the -f parameter to overrule the default local report.txt file.<\/p>\n<p>If you find bugs or want to leave feedback about this tool, please use the <a href=\"\/index.php\/forum\/\" target=\"_blank\" rel=\"noopener\">discussion forum.<\/a><\/p>\n<h3>Download<\/h3>\n<p>Current version :&#160; <strong><!--pvecacert1 --><\/strong><\/p>\n<p>Last update : <strong><!--pvecacert2 --><\/strong><\/p>\n<p>Forum : <a href=\"\/index.php\/forum\/\">http:\/\/www.corelan.be:8800\/index.php\/forum\/pve-ca-cert-list-utility<\/a><\/p>\n<p>Show your respect for my work :<\/p>\n<p>[paypal-donation]<\/p>\n<p>You must be logged on to download this tool. You can register\/log in using the \u201cLogin\/Register\/Logout\u201d link in menu bar at the top of this blog.<\/p>\n<blockquote>\n<p>[download id=14]14[\/download]<\/p>\n<\/blockquote>\n<p>MD5 checksum :<br \/>\n  <br \/><!--pvecacert3 --><\/p>\n<p>Changelog :<br \/>\n  <br \/><!--pvecacert4 --><\/p>\n<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>In one of my earlier posts, I have talked about setting up a Windows 2008 based Certificate Authority\/PKI. Once your Windows 2008 CA setup is in place and configured, you can go ahead and starting issuing certificates. But at the same time, you need to put a maintenance\/management procedure in place so you can stay &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1080,488,127,26],"tags":[673,535,484],"class_list":["post-1610","post","type-post","status-publish","format-standard","hentry","category-certificates","category-corelan-free-tools","category-security","category-windows-server","tag-smtp","tag-encryption","tag-free-tool"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"In one of my earlier posts, I have talked about setting up a Windows 2008 based Certificate Authority\/PKI. Once your Windows 2008 CA setup is in place and configured, you can go ahead and starting issuing certificates. But at the same time, you need to put a maintenance\/management procedure in place so you can stay &hellip; Continue reading &quot;Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2009-04-10T17:08:56+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/10\\\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/10\\\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Free tool : Windows 2003\\\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates\",\"datePublished\":\"2009-04-10T17:08:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/10\\\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\\\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"smtp\",\"encryption\",\"free tool\"],\"articleSection\":[\"Certificates\",\"Corelan Free Tools\",\"Security\",\"Windows Server\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/10\\\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/10\\\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\\\/\",\"name\":\"Free tool : Windows 2003\\\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2009-04-10T17:08:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/10\\\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/10\\\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/10\\\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Free tool : Windows 2003\\\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/","og_locale":"en_US","og_type":"article","og_title":"Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"In one of my earlier posts, I have talked about setting up a Windows 2008 based Certificate Authority\/PKI. Once your Windows 2008 CA setup is in place and configured, you can go ahead and starting issuing certificates. But at the same time, you need to put a maintenance\/management procedure in place so you can stay &hellip; Continue reading \"Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates\"","og_url":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2009-04-10T17:08:56+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates","datePublished":"2009-04-10T17:08:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/"},"wordCount":795,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["smtp","encryption","free tool"],"articleSection":["Certificates","Corelan Free Tools","Security","Windows Server"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/","url":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/","name":"Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2009-04-10T17:08:56+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/10\/free-tool-windows-2008-certificate-authority-certificate-list-utility-for-pending-requests-and-about-to-expire-certificates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Free tool : Windows 2003\/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":18592,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=1610"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1610\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=1610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=1610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=1610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}