How to prevent WannaCry on Windows

How to prevent WannaCry on Windows

[vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” width=”2/3″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”]

There’s a way to prevent the activation of the ransomware WannaCry

After a week talking about how many countries and computers the ransomware WannaCry reached,  the most urgent thing is to close the ports 445/137/138/139, where several options to share the windows closed 445/137/138/139 port for Window2003/XP/Windows 7/Windows 8/Windows 10 system… why? because these are the ports that it use to be activated.

Modify the registry on Windows

Add a registry key, specific steps:

Click “Start”, “Run”, type “regedit” to open the registry.
Locate the registry key “HKEY_LOCAL_MACHINE\System\Controlset\Services\NetBT\Parameters”
Select “Parameters” New Right “DWORD Value.”
Rename the DWORD value as “SMBDeviceEnabled
Right-click “SMBDeviceEnabled” select “Edit” in the “numerical data”, “0”
Key details are as follows:

Hive: HKEY_LOCAL_MACHINE Key: System\CurrentControlSet\Services\NetBT\Parameters Name: SMBDeviceEnabled Type: REG_DWORD Value: 0

After completion modify the registry to restart the computer, and then CMD run “netstat -an | findstr 445” the you’ll see that the port 445 is closed.

This method is not shut itself down port 445, but in order to block access to the external port 445 connected to the machine.

Firewall Advanced Settings – Inbound rules – Right-click New Rule – Select UDP, the port number in the dialog box to write 445.

Then as Administrator, open cmd, run:

net stop server

…and restart your computer. The to finish this long proses you must disable SAMBA (SMBv1)

how to, prevent, ransomware, ransom, cry, wanna cry, wannacry, port, learn, learning, the best security practice, ethical hacking, IT, Admin, Administrator, Server, User, Kali Linux, Phone, Download, Blog, WordPress, Free, Lab, Pentest, Pentester

[/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” width=”1/3″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” offset=”vc_hidden-md vc_hidden-sm vc_hidden-xs”]
[image_with_animation image_url=”6343″ alignment=”center” animation=”Fade In” box_shadow=”none” max_width=”100%” delay=”300″][team_member image_url=”1722″ team_memeber_style=”meta_below” link_element=”none” color=”Accent-Color” name=”Daniel Morales” job_position=”Writer”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#f9f9f9″ scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” bottom_padding=”3%” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” width=”1/1″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][recent_posts style=”default” category=”all” columns=”3″ title_labels=”true” posts_per_page=”3″][/vc_column][/vc_row]

Share it:

Leave a Reply

Your email address will not be published. Required fields are marked *