Expected outcome: Local file containing target computer kernel memory.
Intended only for educational and testing in corporate environments.
ZecOps takes no responsibility for the code, use at your own risk.
Please contact [email protected] if you are interested in agent-less DFIR tools for Servers, Endpoints, and Mobile Devices to detect SMBleed and other types of attacks automatically.
Usage
SMBleed.exe server_name ip_address domain user pass share_name remote_path local_path
Compiled POC
You can get the compiled POC here.
Compiling
Use Visual Studio to compile the following projects:
ProtoSDK\Asn1Base\Asn1Base.csproj
ProtoSDK\MS-XCA\Xca.csproj
ProtoSDK\MS-SMB2\Smb2.sln
References
- SMBleedingGhost Writeup: Chaining SMBleed (CVE-2020-1206) with SMBGhost - ZecOps Blog
- CVE-2020-1206 - Microsoft Security Response Center
(c) 2020 ZecOps, Inc. - https://www.zecops.com - Find Attackers' Mistakes