mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
18 KiB
18 KiB
CVE-2020-0796
Description
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
POC
Reference
- http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html
- http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/156980/Microsoft-Windows-10-SMB-3.1.1-Local-Privilege-Escalation.html
- http://packetstormsecurity.com/files/157110/SMBv3-Compression-Buffer-Overflow.html
- http://packetstormsecurity.com/files/157901/Microsoft-Windows-SMBGhost-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/158054/SMBleed-SMBGhost-Pre-Authentication-Remote-Code-Execution-Proof-Of-Concept.html
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0x25bit/CVE-2020-0796-PoC
- https://github.com/0xMarcio/cve
- https://github.com/0xT11/CVE-POC
- https://github.com/0xcyberpj/windows-exploitation
- https://github.com/0xeb-bp/cve-2020-0796
- https://github.com/0xpetros/windows-privilage-escalation
- https://github.com/0xsyr0/OSCP
- https://github.com/1060275195/SMBGhost
- https://github.com/1stPeak/CVE-2020-0796-Scanner
- https://github.com/20142995/pocsuite
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
- https://github.com/2522595153/text
- https://github.com/2lambda123/CVE-mitre
- https://github.com/2lambda123/Windows10Exploits
- https://github.com/3gstudent/Homework-of-Python
- https://github.com/5l1v3r1/CVE-2020-0796-PoC-3
- https://github.com/5l1v3r1/CVE-2020-0796-PoC-and-Scan
- https://github.com/5l1v3r1/SMBGhost_Crash_Poc
- https://github.com/5l1v3r1/SMBGhosts
- https://github.com/5l1v3r1/cve-2020-0802
- https://github.com/5l1v3r1/smbghost-5
- https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1
- https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ASR511-OO7/windows-kernel-exploits
- https://github.com/ASkyeye/RAGINGBULL
- https://github.com/AaronCaiii/CVE-2020-0796-POC
- https://github.com/AdamSonov/smbGhostCVE-2020-0796
- https://github.com/Aekras1a/CVE-2020-0796-PoC
- https://github.com/Ajomix/CVE-2020-0796
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module
- https://github.com/Almorabea/SMBGhost-WorkaroundApplier
- https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker
- https://github.com/ArrestX/--POC
- https://github.com/Ascotbe/Kernelhub
- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/Aslamlatheef/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/Astrogeorgeonethree/Starred
- https://github.com/Astrogeorgeonethree/Starred2
- https://github.com/Atem1988/Starred
- https://github.com/BC-SECURITY/Moriarty
- https://github.com/BOFs/365CS
- https://github.com/BOFs/CobaltStrike
- https://github.com/Barriuso/SMBGhost_AutomateExploitation
- https://github.com/BinaryShadow94/SMBv3.1.1-scan---CVE-2020-0796
- https://github.com/ButrintKomoni/cve-2020-0796
- https://github.com/COVID-19-CTI-LEAGUE/PRIVATE_Medical_infra_vuln
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CYJoe-Cyclone/Awesome-CobaltStrike
- https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/Cruxer8Mech/Idk
- https://github.com/CyberMonitor/somethingweneed
- https://github.com/DanielBodnar/my-awesome-stars
- https://github.com/Dhoomralochana/Scanners-for-CVE-2020-0796-Testing
- https://github.com/DreamoneOnly/CVE-2020-0796-LPE
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/EncodeGroup/BOF-RegSave
- https://github.com/F6JO/CVE-2020-0796-Batch-scanning
- https://github.com/FULLSHADE/WindowsExploitationResources
- https://github.com/Fernandonov21/CVE
- https://github.com/Getshell/CobaltStrike
- https://github.com/GhostTroops/TOP
- https://github.com/GryllsAaron/CVE-2020-0796-POC
- https://github.com/GuoKerS/Some_Script
- https://github.com/GuoKerS/aioScan_CVE-2020-0796
- https://github.com/HackOvert/awesome-bugs
- https://github.com/Hatcat123/my_stars
- https://github.com/HernanRodriguez1/Dorks-Shodan-2023
- https://github.com/IAreKyleW00t/SMBGhosts
- https://github.com/IFccTeR/1_UP_files
- https://github.com/IFunFox/1_UP_files
- https://github.com/IvanVoronov/0day
- https://github.com/JERRY123S/all-poc
- https://github.com/Jacob10s/SMBGHOST_EXPLOIT
- https://github.com/JaneMandy/Spirit
- https://github.com/Jkrasher/WindowsThreatResearch_JKrasher
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Ken-Abruzzi/cve_2020_0796
- https://github.com/KernelKraze/smb_bulescreen_attack
- https://github.com/LabDookhtegan/CVE-2020-0796-EXP
- https://github.com/Loveforkeeps/Lemon-Duck
- https://github.com/MarcoMuzz/encrypt
- https://github.com/MasterSploit/LPE---CVE-2020-0796
- https://github.com/Mehedi-Babu/active_directory_chtsht
- https://github.com/MinYoungLeeDev/Attack-Defense-Analysis-of-a-Vulnerable-Network
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/MizaruIT/PENTAD-TOOLKIT
- https://github.com/MizaruIT/PENTADAY_TOOLKIT
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC
- https://github.com/MustafaNafizDurukan/WindowsKernelExploitationResources
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/NitroA/windowsexpoitationresources
- https://github.com/NoTsPepino/Shodan-Dorking
- https://github.com/NullArray/WinKernel-Resources
- https://github.com/ORCA666/CVE-2020-0796
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/OldDream666/cve-2020-0796
- https://github.com/Opensitoo/cve-2020-0796
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/QWERTSKIHACK/Active-Directory-Exploitation-Cheat-Sheet.
- https://github.com/RP01XXX/internalpentesting
- https://github.com/Ra7mo0on/SMBGhost
- https://github.com/RonnieNiu/CVE-2020_0796-exp
- https://github.com/Rvn0xsy/CVE_2020_0796_CNA
- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/S3cur3Th1sSh1t/WinPwn
- https://github.com/SEHandler/CVE-2020-0796
- https://github.com/SecWiki/windows-kernel-exploits
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SexurityAnalyst/WinPwn
- https://github.com/SexyBeast233/SecBooks
- https://github.com/SirElmard/ethical_hacking
- https://github.com/SofianeHamlaoui/Conti-Clear
- https://github.com/T13nn3s/CVE-2020-0796
- https://github.com/TamilHackz/windows-exploitation
- https://github.com/TheNorthernLight/InfoSec_h2
- https://github.com/Threekiii/Awesome-POC
- https://github.com/TinToSer/CVE-2020-0796-LPE
- https://github.com/TinToSer/cve2020-0796
- https://github.com/TrojanAZhen/Self_Back
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/UraSecTeam/smbee
- https://github.com/WinMin/Protocol-Vul
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/ZecOps/CVE-2020-0796-LPE-POC
- https://github.com/ZecOps/CVE-2020-0796-RCE-POC
- https://github.com/ZecOps/SMBGhost-SMBleed-scanner
- https://github.com/abdullah098/CVE_2020_0796
- https://github.com/agerKalboetxeaga/Proyecto2_Ciber
- https://github.com/albinjoshy03/windows-kernel-exploits
- https://github.com/albovy/ransomwareMALW
- https://github.com/aleperuz/Windows-Worm
- https://github.com/alian87/windows-kernel-exploits
- https://github.com/anquanscan/sec-tools
- https://github.com/apokryptein/secinject
- https://github.com/arzuozkan/CVE-2020-0796
- https://github.com/asr511/windows-kernel-exploits
- https://github.com/atdpa4sw0rd/Experience-library
- https://github.com/awareseven/eternalghosttest
- https://github.com/awsassets/CVE-2020-0798
- https://github.com/aymankhder/AD-esploitation-cheatsheet
- https://github.com/azhangyuhe/the-sun
- https://github.com/bacth0san96/SMBGhostScanner
- https://github.com/bdisann/ehmylist
- https://github.com/bmphx2/PoC-codes
- https://github.com/bonesg/CVE-2020-0797
- https://github.com/cepxeo/redteambins
- https://github.com/chompie1337/SMBGhost_RCE_PoC
- https://github.com/codewithpradhan/SMBGhost-CVE-2020-0796-
- https://github.com/cory-zajicek/CVE-2020-0796-DoS
- https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/danigargu/CVE-2020-0796
- https://github.com/datntsec/CVE-2020-0796
- https://github.com/datntsec/CVE-2020-1206
- https://github.com/dawnadvent/Taiji
- https://github.com/ddiako/Vulncheck
- https://github.com/demilson/Windows
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dickens88/cve-2020-0796-scanner
- https://github.com/direwolf314/prescup_cheatsheet
- https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/eastmountyxz/CSDNBlog-Security-Based
- https://github.com/eastmountyxz/CVE-2020-0796-SMB
- https://github.com/eastmountyxz/NetworkSecuritySelf-study
- https://github.com/eastmountyxz/SystemSecurity-ReverseAnalysis
- https://github.com/edsonjt81/dazzleUP
- https://github.com/eerykitty/CVE-2020-0796-PoC
- https://github.com/emtee40/win-pwn
- https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976
- https://github.com/eventsentry/scripts
- https://github.com/exfilt/CheatSheet
- https://github.com/exp-sky/CVE-2020-0796
- https://github.com/f1tz/CVE-2020-0796-LPE-EXP
- https://github.com/fei9747/Awesome-CobaltStrike
- https://github.com/fei9747/WindowsElevation
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/gabimarti/SMBScanner
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/githuberxu/Safety-Books
- https://github.com/gnusec/soapffzblogposts_backup
- https://github.com/h7ml/h7ml
- https://github.com/hack-parthsharma/WinPwn
- https://github.com/halsten/CVE-2020-0796
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hectorgie/SMBGHOST
- https://github.com/heeloo123/CVE-2020-0796
- https://github.com/hegusung/netscan
- https://github.com/hello12324/smb_bulescreen_attack
- https://github.com/hillu/nmap-nse-smb2-enhancement
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/hlldz/dazzleUP
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/huimzjty/vulwiki
- https://github.com/hungdnvp/POC-CVE-2020-0796
- https://github.com/hwiwonl/dayone
- https://github.com/i0gan/cve
- https://github.com/iamramahibrah/NSE-Scripts
- https://github.com/intelliroot-tech/cve-2020-0796-Scanner
- https://github.com/ioncodes/SMBGhost
- https://github.com/jamf/CVE-2020-0796-LPE-POC
- https://github.com/jamf/CVE-2020-0796-RCE-POC
- https://github.com/jamf/SMBGhost-SMBleed-scanner
- https://github.com/jbmihoub/all-poc
- https://github.com/jeansgit/Pentest
- https://github.com/jiansiting/CVE-2020-0796
- https://github.com/jiansiting/CVE-2020-0796-Scanner
- https://github.com/joaozietolie/CVE-2020-0796-Checker
- https://github.com/jstigerwalt/SMBGhost
- https://github.com/julixsalas/CVE-2020-0796
- https://github.com/jweny/pocassistdb
- https://github.com/k0imet/CVE-POCs
- https://github.com/k4t3pro/SMBGhost
- https://github.com/k8gege/Aggressor
- https://github.com/k8gege/Ladon
- https://github.com/k8gege/PyLadon
- https://github.com/kdandy/WinPwn
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/khulnasoft-lab/awesome-security
- https://github.com/khulnasoft-labs/awesome-security
- https://github.com/kn6869610/CVE-2020-0796
- https://github.com/krizzz07/CVE-2020-0796
- https://github.com/lanyi1998/TZ
- https://github.com/laolisafe/CVE-2020-0796
- https://github.com/lawrenceamer/0xsp-Mongoose
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lisinan988/CVE-2020-0796-exp
- https://github.com/lnick2023/nicenice
- https://github.com/ly4k/SMBGhost
- https://github.com/lyshark/Windows-exploits
- https://github.com/mai-lang-chai/System-Vulnerability
- https://github.com/manasmbellani/gocmdscanner
- https://github.com/manoz00/mm
- https://github.com/marcinguy/CVE-2020-0796
- https://github.com/mathisvickie/KMAC
- https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC
- https://github.com/merlinepedra/CobaltStrike
- https://github.com/merlinepedra25/CobaltStrike
- https://github.com/michael101096/cs2020_msels
- https://github.com/mishmashclone/SecWiki-windows-kernel-exploits
- https://github.com/msuiche/smbaloo
- https://github.com/netkid123/WinPwn-1
- https://github.com/netscylla/SMBGhost
- https://github.com/nicolas-gagnon/windows-kernel-exploits
- https://github.com/nitromagix/iam-1-cybersecurity-current-event-report
- https://github.com/niudaii/go-crack
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/Windows10Exploits
- https://github.com/orangmuda/CVE-2020-0796
- https://github.com/oscpname/OSCP_cheat
- https://github.com/paramint/windows-kernel-exploits
- https://github.com/parth45/cheatsheet
- https://github.com/password520/Penetration_PoC
- https://github.com/pathakabhi24/Awesome-C
- https://github.com/pengusec/awesome-netsec-articles
- https://github.com/pentration/gongkaishouji
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
- https://github.com/polarityio/youtube
- https://github.com/psc4re/NSE-scripts
- https://github.com/puckiestyle/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/pwninx/WinPwn
- https://github.com/pwnlog/PAD
- https://github.com/pwnlog/PuroAD
- https://github.com/pwnlog/PurpAD
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/rainmana/awesome-rainmana
- https://github.com/ran-sama/CVE-2020-0796
- https://github.com/readloud/Awesome-Stars
- https://github.com/reewardius/0day
- https://github.com/resinprotein2333/Vlun-Finder-bot
- https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/retr0-13/WinPwn
- https://github.com/revanmalang/OSCP
- https://github.com/rhpenguin/tshark-filter
- https://github.com/rodrigosilvaluz/JUST_WALKING_DOG
- https://github.com/root26/bug
- https://github.com/rsmudge/CVE-2020-0796-BOF
- https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/s3mPr1linux/JUST_WALKING_DOG
- https://github.com/safesword/WindowsExp
- https://github.com/shanyuhe/YesPoc
- https://github.com/shengshengli/NetworkSecuritySelf-study
- https://github.com/shuanx/vulnerability
- https://github.com/soapffz/soapffzblogposts
- https://github.com/soosmile/POC
- https://github.com/sponkmonk/Ladon_english_update
- https://github.com/stalker3343/diplom
- https://github.com/sujitawake/smbghost
- https://github.com/sung3r/CobaltStrike
- https://github.com/supermandw2018/SystemSecurity-ReverseAnalysis
- https://github.com/svbjdbk123/-
- https://github.com/syadg123/CVE-2020-0796
- https://github.com/syadg123/SMBGhost
- https://github.com/t0rt3ll1n0/cms-scanner
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tango-j/CVE-2020-0796
- https://github.com/tanjiti/sec_profile
- https://github.com/technion/DisableSMBCompression
- https://github.com/testbugonly/Defence
- https://github.com/thelostworldFree/CVE-2020-0796
- https://github.com/tobor88/PowerShell-Blue-Team
- https://github.com/todo1024/1657
- https://github.com/trganda/starrlist
- https://github.com/tripledd/cve-2020-0796-vuln
- https://github.com/txuswashere/OSCP
- https://github.com/uhub/awesome-c
- https://github.com/vs4vijay/exploits
- https://github.com/vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-
- https://github.com/vysecurity/CVE-2020-0796
- https://github.com/w1ld3r/SMBGhost_Scanner
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/wenwen104/ipas2020
- https://github.com/whitfieldsdad/cisa_kev
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/wneessen/SMBCompScan
- https://github.com/wolfyy59/keylogger-C-
- https://github.com/wrlu/Vulnerabilities
- https://github.com/wsfengfan/CVE-2020-0796
- https://github.com/xax007/CVE-2020-0796-Scanner
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xhref/OSCP
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yanghaoi/ReflectiveDllSource
- https://github.com/ycdxsb/Exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji
- https://github.com/yisan1/hh
- https://github.com/ysyyrps123/CVE-2020-0796-exp
- https://github.com/z1un/Z1-AggressorScripts
- https://github.com/zathizh/cve-796-mit
- https://github.com/zer0yu/Awesome-CobaltStrike
- https://github.com/zhouzu/SMBGhost-Full-RCE