Skip to content

FroggDev/BASH_froggPoodler

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 

Repository files navigation

froggPoodler

  • Vulnerability POODLE
  • CVE-2014-3566

this code is used to test Poodle vulnerability on SSL3 exploit, based on Dan Varga works (from redhat) script. I made some change and now the Poodle vulnerability check is more clean for me...

=> Script call :

  • bash poodle.sh {serverIP} {serverPort}
  • info : serverIP and serverPort are optional

=> 20141017 - Frogg change from original:

  • if script ip isnt set, set 127.0.0.1 as default ip
  • change if and elseif for a switch
  • added some comments
  • added text color and formating

code to prevent ^M : sed -i 's/\r$//' {fileName}

About

Test Poodle Exploit on a linux server using bash

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages