{"id":7030,"date":"2014-12-19T11:35:56","date_gmt":"2014-12-19T10:35:56","guid":{"rendered":"https:\/\/anexia.com\/stagingblog\/?p=7030"},"modified":"2022-04-22T12:13:48","modified_gmt":"2022-04-22T10:13:48","slug":"winshock-test-wrap-up","status":"publish","type":"post","link":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/","title":{"rendered":"WinShock Test wrap-up"},"content":{"rendered":"<p>When WinShock (<a title=\"Microsoft Technet: MS Bulletin MS14-066\" href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms14-066.aspx\" target=\"_blank\" rel=\"noopener\">MS14-066<\/a>, <a title=\"CVE: CVE-2014-6321\" href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6321\" target=\"_blank\" rel=\"noopener\">CVE-2014- 6321<\/a>) came to light on 11th of November this year, our emergency response team, consisting of members of our IT and R&amp;D departments created a small shell script which allowed remote detection of the vulnerability.<\/p>\n<p>After some internal testing we made that script, called winshock-test, available to the general public on <a title=\"GitHub: anexia-it\/winshock-test\" href=\"https:\/\/github.com\/anexia-it\/winshock-test\" target=\"_blank\" rel=\"noopener\">GitHub<\/a>.<\/p>\n<p>Let&#8217;s quickly dive into how that script works:<\/p>\n<p>Besides the critical security fix for MS14-066, Microsoft also introduced a set of four new SSL\/TLS cipher suites with the corresponding patch (<a title=\"Microsoft Knowledge Base: 2992611\" href=\"https:\/\/support.microsoft.com\/kb\/2992611\/\" target=\"_blank\" rel=\"noopener\">KB2992611<\/a>).<\/p>\n<p>These newly introduced cipher suites created up a simple way for checking the patch-state for those systems: checking whether those cipher suites are supported by SSL\/TLS-based services a host provides or not.<\/p>\n<p>After realizing this fact, we created a script which uses OpenSSL&#8217;s s_client functionality and testing if the target service allows negotation of those cipher suites.<\/p>\n<p>Besides the script&#8217;s source code, some additional information on this approach can be found inside the <a title=\"GitHub: anexia-it\/winshock-test: README.md\" href=\"https:\/\/github.com\/anexia-it\/winshock-test\/blob\/master\/README.md\" target=\"_blank\" rel=\"noopener\">README file<\/a> of the script.<\/p>\n<p>As a few weeks have passed since then, it is time for a short wrap-up. Besides praise from IT-operators from all over the world, it seems as if our script also caught some attention from persons and entities within the information security community.<\/p>\n<p>So, in short our script has been linked to and\/or recommended in the following articles (in alphabetical order):<\/p>\n<ul>\n<li>7Elements &#8211; Independent information security consultancy <a title=\"7elements.co.uk: Winshock Exploits (MS-14-064) Gone Wild, Patch Now!\" href=\"http:\/\/www.7elements.co.uk\/resources\/blog\/winshock-exploits-ms-14-064\/\" target=\"_blank\" rel=\"noopener\">Blog Post<\/a><\/li>\n<li>CERT <a title=\"CERT Knowledge Base Article 505120\" href=\"http:\/\/www.kb.cert.org\/vuls\/id\/505120\" target=\"_blank\" rel=\"noopener\">Knowledge Base Article 505120<\/a><\/li>\n<li>Dunn3S3C (Ronan Dunne) <a title=\"dunnesec.com: WinShock \u2013 Bug\" href=\"http:\/\/dunnesec.com\/2014\/11\/13\/winshock-bug\/\" target=\"_blank\" rel=\"noopener\">Blog Post<\/a><\/li>\n<li><a title=\"security.nl: schannel CVE-2014-6321 (MS14-066 \/ KB2992611)\" href=\"https:\/\/www.security.nl\/posting\/408481\" target=\"_blank\" rel=\"noopener\">security.nl<\/a><\/li>\n<\/ul>\n<p>Overall, it is a great feeling that one of our small test tools did not only help other IT-operators, but was also recommended by information security professionals.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When WinShock came to light on 11th of November this year, our emergency response team, consisting of members of our IT and R&#038;D departments created a small shell script which allowed remote detection of the vulnerability.<\/p>\n","protected":false},"author":5,"featured_media":550,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1129],"tags":[1622,1442,1963,1379,2149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WinShock Test wrap-up - ANEXIA Blog<\/title>\n<meta name=\"description\" content=\"When WinShock came to light on 11th of November this year, our emergency response team, consisting of members of our IT and R&amp;D departments created a small shell script which allowed remote detection of the vulnerability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WinShock Test wrap-up - ANEXIA Blog\" \/>\n<meta property=\"og:description\" content=\"When WinShock came to light on 11th of November this year, our emergency response team, consisting of members of our IT and R&amp;D departments created a small shell script which allowed remote detection of the vulnerability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/\" \/>\n<meta property=\"og:site_name\" content=\"ANEXIA Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/anexiagmbh\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-19T10:35:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-22T10:13:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2014\/12\/Stephan-Peijnik_anexia-blau_web.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1066\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stephan Peijnik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@_ANEXIA\" \/>\n<meta name=\"twitter:site\" content=\"@_ANEXIA\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stephan Peijnik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/\",\"url\":\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/\",\"name\":\"WinShock Test wrap-up - ANEXIA Blog\",\"isPartOf\":{\"@id\":\"https:\/\/anexia.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2014\/12\/Stephan-Peijnik_anexia-blau_web.jpg\",\"datePublished\":\"2014-12-19T10:35:56+00:00\",\"dateModified\":\"2022-04-22T10:13:48+00:00\",\"author\":{\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/8f95147348ae0ed7e4c25999bebf0f1d\"},\"description\":\"When WinShock came to light on 11th of November this year, our emergency response team, consisting of members of our IT and R&D departments created a small shell script which allowed remote detection of the vulnerability.\",\"breadcrumb\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#primaryimage\",\"url\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2014\/12\/Stephan-Peijnik_anexia-blau_web.jpg\",\"contentUrl\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2014\/12\/Stephan-Peijnik_anexia-blau_web.jpg\",\"width\":1600,\"height\":1066},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/anexia.com\/blog\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WinShock Test wrap-up\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/anexia.com\/blog\/#website\",\"url\":\"https:\/\/anexia.com\/blog\/\",\"name\":\"ANEXIA Blog\",\"description\":\"[:de] ANEXIA Blog - Technischen Themen, Anexia News und Insights [:]\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/anexia.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/8f95147348ae0ed7e4c25999bebf0f1d\",\"name\":\"Stephan Peijnik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0bfcb213a87f6c6c67ec494bc0ae5585?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0bfcb213a87f6c6c67ec494bc0ae5585?s=96&d=mm&r=g\",\"caption\":\"Stephan Peijnik\"},\"url\":\"https:\/\/anexia.com\/blog\/author\/spe\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WinShock Test wrap-up - ANEXIA Blog","description":"When WinShock came to light on 11th of November this year, our emergency response team, consisting of members of our IT and R&D departments created a small shell script which allowed remote detection of the vulnerability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/","og_locale":"de_DE","og_type":"article","og_title":"WinShock Test wrap-up - ANEXIA Blog","og_description":"When WinShock came to light on 11th of November this year, our emergency response team, consisting of members of our IT and R&D departments created a small shell script which allowed remote detection of the vulnerability.","og_url":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/","og_site_name":"ANEXIA Blog","article_publisher":"https:\/\/www.facebook.com\/anexiagmbh\/","article_published_time":"2014-12-19T10:35:56+00:00","article_modified_time":"2022-04-22T10:13:48+00:00","og_image":[{"width":1600,"height":1066,"url":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2014\/12\/Stephan-Peijnik_anexia-blau_web.jpg","type":"image\/jpeg"}],"author":"Stephan Peijnik","twitter_card":"summary_large_image","twitter_creator":"@_ANEXIA","twitter_site":"@_ANEXIA","twitter_misc":{"Verfasst von":"Stephan Peijnik","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/","url":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/","name":"WinShock Test wrap-up - ANEXIA Blog","isPartOf":{"@id":"https:\/\/anexia.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#primaryimage"},"image":{"@id":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#primaryimage"},"thumbnailUrl":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2014\/12\/Stephan-Peijnik_anexia-blau_web.jpg","datePublished":"2014-12-19T10:35:56+00:00","dateModified":"2022-04-22T10:13:48+00:00","author":{"@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/8f95147348ae0ed7e4c25999bebf0f1d"},"description":"When WinShock came to light on 11th of November this year, our emergency response team, consisting of members of our IT and R&D departments created a small shell script which allowed remote detection of the vulnerability.","breadcrumb":{"@id":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#primaryimage","url":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2014\/12\/Stephan-Peijnik_anexia-blau_web.jpg","contentUrl":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2014\/12\/Stephan-Peijnik_anexia-blau_web.jpg","width":1600,"height":1066},{"@type":"BreadcrumbList","@id":"https:\/\/anexia.com\/blog\/en\/winshock-test-wrap-up\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/anexia.com\/blog\/de\/"},{"@type":"ListItem","position":2,"name":"WinShock Test wrap-up"}]},{"@type":"WebSite","@id":"https:\/\/anexia.com\/blog\/#website","url":"https:\/\/anexia.com\/blog\/","name":"ANEXIA Blog","description":"[:de] ANEXIA Blog - Technischen Themen, Anexia News und Insights [:]","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/anexia.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/8f95147348ae0ed7e4c25999bebf0f1d","name":"Stephan Peijnik","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0bfcb213a87f6c6c67ec494bc0ae5585?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bfcb213a87f6c6c67ec494bc0ae5585?s=96&d=mm&r=g","caption":"Stephan Peijnik"},"url":"https:\/\/anexia.com\/blog\/author\/spe\/"}]}},"lang":"en","translations":{"en":7030,"de":354},"amp_enabled":true,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/7030"}],"collection":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/comments?post=7030"}],"version-history":[{"count":1,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/7030\/revisions"}],"predecessor-version":[{"id":7033,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/7030\/revisions\/7033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/media\/550"}],"wp:attachment":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/media?parent=7030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/categories?post=7030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/tags?post=7030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}