Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
CVE-2020-0796. Scan HOST/CIDR with nmap script smb-protocols.nse and grep SMB version 3.11.
#!/bin/bash
if [ $# -eq 0 ]
then
echo $'Usage:\n\tcheck-smb-v3.11.sh TARGET_IP_or_CIDR'
exit 1
fi
echo "Checking if there's SMB v3.11 in" $1 "..."
nmap -p445 --script smb-protocols -Pn -n $1 | grep -P '\d+\.\d+\.\d+\.\d+|^\|.\s+3.11' | tr '\n' ' ' | replace 'Nmap scan report for' '@' | tr "@" "\n" | grep 3.11 | tr '|' ' ' | tr '_' ' ' | grep -oP '\d+\.\d+\.\d+\.\d+'
if [[ $? != 0 ]]; then
echo "There's no SMB v3.11"
fi
@freb
Copy link

freb commented Mar 17, 2020

Another option for nmap: https://github.com/pr4jwal/CVE-2020-0796

@hackerpain
Copy link

hackerpain commented Mar 17, 2020

@nikallass @freb @goncalor @tuantmb getting error

socket_bindtodevice: Protocol not available                                                                             Problem binding to interface , errno: 92  

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment