# CVE-2020-0796
# SMBGhost (from ollypwn)
Simple scanner for CVE-2020-0796 - SMBv3 RCE.
The scanner is for meant only for testing whether a server is vulnerable. It is not meant for research or development, hence the fixed payload.
It checks for SMB dialect 3.1.1 and compression capability through a negotiate request.
A network dump of the scanner running against a Windows 2019 Server (10.0.0.133) can be found under `SMBGhost.pcap`.
# Scan
`python3 CVE-2020-0796_Scan_Vul.py <IP>`
# How to protect your computer
You can disable compression to block unauthenticate attackers from exploiting the vulnerability against an SMBv3 Server with the PowerShell command below.
```
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" DisableCompression -Type DWORD -Value 1 -Force
```
[4.0K] /data/pocs/703b0194bc0ece0f7192958cf985924dd2fbda80
├── [1.1K] CVE-2020-0796_Scan_Vul.py
├── [ 452] CVE-2020-0796_test.sh
├── [ 823] README.md
└── [1.4K] SMBGhost.pcap
0 directories, 4 files