Skip to content

Instantly share code, notes, and snippets.

@Caffe1neAdd1ct
Created October 15, 2014 13:51
Show Gist options
  • Save Caffe1neAdd1ct/75040d8b2daa5bf243f2 to your computer and use it in GitHub Desktop.
Save Caffe1neAdd1ct/75040d8b2daa5bf243f2 to your computer and use it in GitHub Desktop.
Test script for SSLv3 Poodle Bug
#!/bin/bash
HOST=$1
PORT=$2
INJECTION="sslv3 alert handshake failure"
OUTPUT=$(openssl s_client -connect $HOST:$PORT -ssl3 2>&1);
FAILED="connect:errno"
if [[ $OUTPUT == *"$INJECTION"* ]]
then
echo -e "Server is secure and refusing communications on sslv3."
elif [[ $OUTPUT == *"$FAILED"* ]]
then
echo -e "Connection to host / port failed.";
else
echo -e "WARNING - Server is vulnerable please stop communication on sslv3 for the tested port / site.";
fi
@Caffe1neAdd1ct
Copy link
Author

Download above test script:

wget https://gist.githubusercontent.com/Caffe1neAdd1ct/75040d8b2daa5bf243f2/raw/234eadc757438852992be4de8a1a9f6b879829b4/poodle-bleed-tester.sh

Make executable:

chmod +x poodle-bleed-tester.sh

Run with host and port parameters:

./poodle-bleed-tester.sh portal.zvps.uk 443

Change host and port parameters to test your own servers and services using ssl.

@QkiZMR
Copy link

QkiZMR commented Nov 9, 2015

This script gives false possitive when test Postfix submission port

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment