Closed sadbosan closed 4 years ago
root@kali:~/SMBGhost_RCE_PoC-master# python exploit.py -ip 172.22.5.129 Traceback (most recent call last): File "exploit.py", line 465, in do_rce(args.ip, args.port) File "exploit.py", line 426, in do_rce find_low_stub(ip, port) File "exploit.py", line 405, in find_low_stub buff = read_physmem_primitive(ip, port, index) File "exploit.py", line 205, in read_physmem_primitive buff = try_read_physmem_primitive(ip, port, phys_addr) File "exploit.py", line 220, in try_read_physmem_primitive buff = sock.recv(1000) socket.timeout: timed out
how should i fix it
is SMB compression enabled? have you tried DOS PoC to see if the machine is vulnerable?
https://github.com/eerykitty/CVE-2020-0796-PoC
root@kali:~/SMBGhost_RCE_PoC-master# python exploit.py -ip 172.22.5.129 Traceback (most recent call last): File "exploit.py", line 465, in
do_rce(args.ip, args.port)
File "exploit.py", line 426, in do_rce
find_low_stub(ip, port)
File "exploit.py", line 405, in find_low_stub
buff = read_physmem_primitive(ip, port, index)
File "exploit.py", line 205, in read_physmem_primitive
buff = try_read_physmem_primitive(ip, port, phys_addr)
File "exploit.py", line 220, in try_read_physmem_primitive
buff = sock.recv(1000)
socket.timeout: timed out
how should i fix it