Skip to content

Commit d3adc9b

Browse files
author
iBearcat
authoredJun 19, 2018
Update README.md
1 parent 00cae60 commit d3adc9b

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed
 

Diff for: ‎MS14-066/README.md

+10-8
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,29 @@
1-
winshock-test
2-
=============
1+
## CVE-2014-6321 (MS14-066) KB2992611
32

4-
Bash script that tests if a system is Winshock (MS14-066) vulnerable.
53

6-
This script was developed by the emergency response team at [ANEXIA](http://www.anexia-wwc.com).
4+
### Version impact
75

8-
Important
6+
Windows VistaSP2、Windows 7 SP1、Windows 8、Windows 8.1
7+
Windows Server 2003 SP2、2008 SP2、2008 R2 SP1、2012、2012 R2
8+
Windows RT和Windows RT 8.1。
9+
10+
### Important
911
---------
1012

1113
winshock_test.sh does behavioural analysis based upon the available SSL ciphers.
1214
If you either do not have direct access to the target system due to SSL-offloading in any form or manually modified the available SSL ciphers the script will
1315
be giving **false positives**.
1416

1517

16-
Disclaimer
18+
### Disclaimer
1719
----------
1820

1921
This script does in no way try to exploit the vulnerability described in MS14-066.
2022
It merely checks for hints on whether the target system has been patched or not.
2123
For details, have a look at the script itself or read the short 'How it works'
2224
part of this document below.
2325

24-
Usage
26+
### Usage
2527
-----
2628

2729
```shell
@@ -41,7 +43,7 @@ load balancer or any other form of SSL-offloading may impact the results
4143
and may generate false-positives or false-negatives.
4244

4345

44-
How it works
46+
### How it works
4547
------------
4648

4749
MS14-066 introduced four new SSL ciphers, so a check can be made if

0 commit comments

Comments
 (0)
Please sign in to comment.