EternalBlue Package (Blocker & Checker) - Enable or disable WannaCry, NotPetya, etc... (1 Viewer)

Joined
Jun 23, 2018
Credits
81
Rating - 0%
EternalBlue Blocker
Enable or Disable SMB system vulnerability that can be explored by WannaCry, NotPetya or any other EternalBlue exploit tool.

EternalBlues
Check if your WAN/LAN computers are vulnerable to SMB system vulnerability.

How to use?
1) Execute "EternalBlue Blocker" with admin privileges.
2) Select option 2
3) Execute "EternalBlues"
4) Click on Scan
5) Scroll the list looking for your computer name or local IP.

Note: If successfully blocked there should be "NO" in EternalBlues in your IP/Hostname.

EternalBlue Blocker Source Code
Code:
@title EternalBlue Exploit Blocker
@echo off
:start
echo .....................................................
echo .            EternalBlue Exploit Blocker            .
echo .                                                   .
echo .  (This program requires admin privileges to run)  .
echo .....................................................
set /p choice=Enable (1)/Disable (2) EternalBlue Exploit: 
if '%choice%'=='1' goto 1
if '%choice%'=='2' goto 2
cls
goto start
:1
cls
echo .....................................................
echo .            EternalBlue Exploit Blocker            .
echo .                                                   .
echo .  (This program requires admin privileges to run)  .
echo .....................................................
echo This will turn this computer vulnerable to WannaCry,
echo NotPetya or any other EternalBlue exploit tool.
echo .....................................................
set /p choice=Are you sure you want to unprotect this computer? (y=Yes/n=No) 
if '%choice%'=='y' goto y
if '%choice%'=='n' goto n
cls
goto start
:y
reg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v SMB1 /t REG_DWORD /d "1" /f
reg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v SMB2 /t REG_DWORD /d "1" /f
pause
cls
goto start
:n
cls
goto start
:2
reg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v SMB1 /t REG_DWORD /d "0" /f
reg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v SMB2 /t REG_DWORD /d "0" /f
pause
cls

EternalBlues Source Code
Code:
Not my code...

Download:
https://www.file-up.org/ridvxk3k63hg

Download 2:
https://www.solidfiles.com/v/7pgQ8n4VWpkNV

Virus Scan
https://www.virustotal.com/#/file/a...433d71b26c9e112a0f44a58076562d4b7f1/detection
 

Users who are viewing this thread

Top