{"id":5515,"date":"2020-10-01T17:21:43","date_gmt":"2020-10-01T17:21:43","guid":{"rendered":"https:\/\/www.geekdecoder.com\/?p=5515"},"modified":"2020-10-01T17:21:43","modified_gmt":"2020-10-01T17:21:43","slug":"disable-tcp-port-135-and-avoid-wannacry-windows-10","status":"publish","type":"post","link":"https:\/\/www.qbytes.cloud\/index.php\/2020\/10\/01\/disable-tcp-port-135-and-avoid-wannacry-windows-10\/","title":{"rendered":"Disable TCP Port 135 and Avoid WannaCry Windows 10"},"content":{"rendered":"<p>Check open ports:<\/p>\n<p>How to identify the processes that are keeping ports open<\/p>\n<p>Windows OS<\/p>\n<p>For Windows operating systems, you can use netstat, which is included with the OS. On the scanned server, open command prompt. Run the command: <\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">netstat -ano<\/pre>\n<p>This will list all the network connections on the machine. The last column shows the process ID of the process for the specific network connection. You will probably want to filter this down using the \u2018find\u2019 command. For example, if you only want to list the network connections on port 135, use:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">netstat -ano | find \u201c:135\u201d<\/pre>\n<p>This will list a network connection in LISTENING mode and the id of the process that opened the connection. Use \u201ctasklist \/SVC \/FI \u201cPID eq xxx\u201d to show the name of the process and service for process id xxx.<br \/>\nFor example, if you want to list the information about processed id 7424, use:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">tasklist \/SVC \/FI \u201cPID eq 7424<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Check open ports: How to identify the processes that are keeping ports open Windows OS For Windows operating systems, you can use netstat, which is included with the OS. On the scanned server, open command prompt. Run the command: netstat -ano This will list all the network connections on the machine. The last column shows &#8230; <a title=\"Disable TCP Port 135 and Avoid WannaCry Windows 10\" class=\"read-more\" href=\"https:\/\/www.qbytes.cloud\/index.php\/2020\/10\/01\/disable-tcp-port-135-and-avoid-wannacry-windows-10\/\" aria-label=\"Read more about Disable TCP Port 135 and Avoid WannaCry Windows 10\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[102,126,127],"tags":[],"class_list":["post-5515","post","type-post","status-publish","format-standard","hentry","category-security","category-windows-desktop","category-winserv"],"_links":{"self":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/5515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/comments?post=5515"}],"version-history":[{"count":0,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/5515\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/media?parent=5515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/categories?post=5515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/tags?post=5515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}