Skip to content

Instantly share code, notes, and snippets.

@Rob-Conan
Rob-Conan / windows_hardening.cmd
Created September 2, 2019 08:31 — forked from jaredhaight/windows_hardening.cmd
Script to perform some hardening of Windows OS.
::
::#######################################################################
::
:: Change file associations to protect against common ransomware attacks
:: Note that if you legitimately use these extensions, like .bat, you will now need to execute them manually from cmd or powershell
:: Alternatively, you can right-click on them and hit 'Run as Administrator' but ensure it's a script you want to run :)
:: ---------------------
ftype htafile="%SystemRoot%\system32\NOTEPAD.EXE" "%1"
ftype WSHFile="%SystemRoot%\system32\NOTEPAD.EXE" "%1"
ftype batfile="%SystemRoot%\system32\NOTEPAD.EXE" "%1"
##
# Author: Rob Conan
# GitHub: Rob-Conan
#
#
# Powershell Script to enable/disable interfaces based on a users input
#
# To get a list of devices from powershell you need Devcon
# https://msdn.microsoft.com/en-us/library/windows/hardware/ff544707(v=vs.85).aspx
# Empty

Keybase proof

I hereby claim:

  • I am rob-conan on github.
  • I am robconan (https://keybase.io/robconan) on keybase.
  • I have a public key whose fingerprint is C321 6EEC 4D4F 2834 1120 905A 209A A37E 955B A840

To claim this, I am signing this object: