SMBGhost Analysis_Microsoft SMBv3 Remote Code Execution Vulnerability
The SMB protocol is the protocol that WannaCry and NotPetya ransomware worms used in 2017. Using vulnerabilities targeting the SMB server, unauthenticated attackers can send specially crafted packets to the target SMBv3 server. To exploit the vulnerabilities targeted at the SMB client, an authenticated attacker will need to configure a malicious SMBv3 server and trick users into connecting to it.
Resource registration
Fields marked with an asterisk are required.