Test Poodle Exploit on a linux server using bash
Clone or download
FroggDev Revert "Update README.md"
This reverts commit 6162093.
Latest commit 61d7769 Oct 28, 2014
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
README.md
froggPoodler.sh

README.md

froggPoodler

  • Vulnerability POODLE
  • CVE-2014-3566

this code is used to test Poodle vulnerability on SSL3 exploit, based on Dan Varga works (from redhat) script. I made some change and now the Poodle vulnerability check is more clean for me...

=> Script call :

  • bash poodle.sh {serverIP} {serverPort}
  • info : serverIP and serverPort are optional

=> 20141017 - Frogg change from original:

  • if script ip isnt set, set 127.0.0.1 as default ip
  • change if and elseif for a switch
  • added some comments
  • added text color and formating

code to prevent ^M : sed -i 's/\r$//' {fileName}