Scanner for CVE-2020-0796 - SMBv3 RCE# SMBGhost
Simple scanner for CVE-2020-0796 - SMBv3 RCE.
The scanner is for meant only for testing whether a server is vulnerable. It is not meant for research or development, hence the fixed payload.
It checks for SMB dialect 3.1.1 and compression capability through a negotiate request.
A network dump of the scanner running against a Windows 2019 Server (10.0.0.133) can be found under `SMBGhost.pcap`.
## Usage
`python3 scanner.py <IP>`
## Workarounds
[ADV200005 | Microsoft Guidance for Disabling SMBv3 Compression](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/adv200005)
```
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" DisableCompression -Type DWORD -Value 1 -Force
```
[4.0K] /data/pocs/c2d548d63c34efacc3f72fb92b8ee81d221da500
├── [ 752] README.md
├── [1.3K] scanner.py
└── [1.4K] SMBGhost.pcap
0 directories, 3 files