SMBGhost Analysis_Microsoft SMBv3 Remote Code Execution Vulnerability

The SMB protocol is the protocol that WannaCry and NotPetya ransomware worms used in 2017. Using vulnerabilities targeting the SMB server, unauthenticated attackers can send specially crafted packets to the target SMBv3 server. To exploit the vulnerabilities targeted at the SMB client, an authenticated attacker will need to configure a malicious SMBv3 server and trick users into connecting to it.

Resource registration

Fields marked with an asterisk are required.
  • This field is for validation purposes and should be left unchanged.