https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/adv200005
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796
#!/bin/bash
if [ $# -eq 0 ]
then
echo $'Usage:\n\tscan_vul_smb_v3.11.sh TARGET_IP_or_CIDR'
exit 1
fi
echo "Checking if there's SMB v3.11 in" $1 "..."
nmap -p445 --script smb-protocols -Pn -n $1 | grep -P '\d+\.\d+\.\d+\.\d+|^\|.\s+3.11' | tr '\n' ' ' | replace 'Nmap scan report for' '@' | tr "@" "\n" | grep 3.11 | tr '|' ' ' | tr '_' ' ' | grep -oP '\d+\.\d+\.\d+\.\d+'
if [[ $? != 0 ]]; then
echo "There's no SMB v3.11"
fi
####
# Credit: nikallass
####
'Exploit?' 카테고리의 다른 글
Oracle WebLogic RCE POC [CVE-2020-2555] (0) | 2020.04.16 |
---|---|
RESPONSE ZERO-DAY IN THE ADOBE TYPE MANAGER LIBRARY (0) | 2020.04.07 |
CVE-2020-0796 SMBV3 REMOTE CHECK BY PYTHON [KB4551762] (0) | 2020.04.07 |
CVE-2017-7494 SMB REMOTE EXPLOIT IN METASPLOITMODULE (0) | 2020.04.07 |
CVE-2017-7494 SMB REMOTE EXPLOIT IN PYTHON (0) | 2020.04.07 |