From 945d8647bf68a63bcec60a2cdfd75fe36e8d147b Mon Sep 17 00:00:00 2001 From: silversword411 Date: Thu, 15 Apr 2021 11:34:35 -0400 Subject: [PATCH] script add ipv6 disable --- api/tacticalrmm/scripts/community_scripts.json | 10 ++++++++++ scripts/Win_Network_IPv6_Disable.ps1 | 8 ++++++++ 2 files changed, 18 insertions(+) create mode 100644 scripts/Win_Network_IPv6_Disable.ps1 diff --git a/api/tacticalrmm/scripts/community_scripts.json b/api/tacticalrmm/scripts/community_scripts.json index 1a986bad..9a644cb2 100644 --- a/api/tacticalrmm/scripts/community_scripts.json +++ b/api/tacticalrmm/scripts/community_scripts.json @@ -460,6 +460,16 @@ "category": "TRMM (Win):Network", "default_timeout": "90" }, + { + "guid": "abe78170-7cf9-435b-9666-c5ef6c11a106", + "filename": "Win_Network_IPv6_Disable.ps1", + "submittedBy": "https://github.com/silversword411", + "name": "Network IPv6 - Disable", + "description": "Disable IPv6 on all adapters", + "shell": "powershell", + "category": "TRMM (Win):Network", + "default_timeout": "90" + }, { "guid": "6ce5682a-49db-4c0b-9417-609cf905ac43", "filename": "Win_Win10_Change_Key_and_Activate.ps1", diff --git a/scripts/Win_Network_IPv6_Disable.ps1 b/scripts/Win_Network_IPv6_Disable.ps1 new file mode 100644 index 00000000..f4a4a08a --- /dev/null +++ b/scripts/Win_Network_IPv6_Disable.ps1 @@ -0,0 +1,8 @@ +#CVE-2020-16898 | Windows TCP/IP Remote Code Execution Vulnerability +#https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898 + +#Disable IPv6 on All Adapers +Disable-NetAdapterBinding -Name "*" -ComponentID ms_tcpip6 + +#Confirm That all NIC's no longer have IPv6 Enabled +(Get-NetAdapterBinding -Name '*' -ComponentID ms_tcpip6).Enabled \ No newline at end of file