Report LinksWe do not store any files or images on our server. XenPaste only index and link to content provided by other non-affiliated sites. If your copyrighted material has been posted on XenPaste or if hyperlinks to your copyrighted material are returned through our search engine and you want this material removed, you must contact the owners of such sites where the files and images are stored.
EternalBlue Blocker
Enable or Disable SMB system vulnerability that can be explored by WannaCry, NotPetya or any other EternalBlue exploit tool.
EternalBlues
Check if your WAN/LAN computers are vulnerable to SMB system vulnerability.
How to use?
1) Execute "EternalBlue Blocker" with admin privileges.
2) Select option 2
3) Execute "EternalBlues"
4) Click on Scan
5) Scroll the list looking for your computer name or local IP.
Note: If successfully blocked there should be "NO" in EternalBlues in your IP/Hostname.
EternalBlue Blocker Source Code
Code:
@title EternalBlue Exploit Blocker
@echo off
:start
echo .....................................................
echo . EternalBlue Exploit Blocker .
echo . .
echo . (This program requires admin privileges to run) .
echo .....................................................
set /p choice=Enable (1)/Disable (2) EternalBlue Exploit:
if '%choice%'=='1' goto 1
if '%choice%'=='2' goto 2
cls
goto start
:1
cls
echo .....................................................
echo . EternalBlue Exploit Blocker .
echo . .
echo . (This program requires admin privileges to run) .
echo .....................................................
echo This will turn this computer vulnerable to WannaCry,
echo NotPetya or any other EternalBlue exploit tool.
echo .....................................................
set /p choice=Are you sure you want to unprotect this computer? (y=Yes/n=No)
if '%choice%'=='y' goto y
if '%choice%'=='n' goto n
cls
goto start
:y
reg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v SMB1 /t REG_DWORD /d "1" /f
reg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v SMB2 /t REG_DWORD /d "1" /f
pause
cls
goto start
:n
cls
goto start
:2
reg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v SMB1 /t REG_DWORD /d "0" /f
reg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v SMB2 /t REG_DWORD /d "0" /f
pause
cls