SMBGhost (CVE-2020-0796) threaded scanner# SMBGhost
Simple threaded scanner for CVE-2020-0796 - SMBv3 RCE.
The scanner is for meant only for testing whether a server is vulnerable. It is not meant for research or development, hence the fixed payload.
It checks for SMB dialect 3.1.1 and compression capability through a negotiate request.
A network dump of the scanner running against a Windows 2019 Server (10.0.0.133) can be found under `https://github.com/ollypwn/SMBGhost/blob/master/SMBGhost.pcap`.
`python3 scanner.py -r <CIDR range> <-t threads> <-v verbose> <-o output file>`
## Usage
## Workarounds
[ADV200005 | Microsoft Guidance for Disabling SMBv3 Compression](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/adv200005)
```
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" DisableCompression -Type DWORD -Value 1 -Force
```
# Credits
* https://github.com/ollypwn/SMBGhost
[4.0K] /data/pocs/5086c09849ac066779d7ee5da5fe53db1dc2ab61
├── [ 910] README.md
├── [ 16] requirements.txt
└── [4.5K] scanner.py
0 directories, 3 files