
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
Utility to generate a batch file to manage inbound and outbound Windows firewall connections for a single exe file or all exe files in folder
netsh-rule will generate a file that allows to apply firewall rule to the specified application or all executables in the specified folder.
npm -g i netsh-rule
or
yarn global add netsh-rule
netsh-rule <filename | folder> [options]
| option | description |
|---|---|
| name | The rule name (name will be generated if missing name) |
| program | Absolute path to <filename | folder> |
| enable | Enable rule: yes | no (default: yes) |
| dir | The rule is inbound or outbound: in | out | both (default: both i.e. in and out) |
| action | The action for rule: allow | block (default: block) |
| profile | Apply rule for: public | private | domain (default: public, private, domain) |
| format | Output format can be batch file, powershell, or javascript: bat | ps1 | js (default: bat) |
netsh advfirewall firewall add rule
Add an inbound rule with no encapsulation security for messenger.exe:
netsh advfirewall firewall add rule name="allow messenger" dir=in program="c:\programfiles\messenger\msmsgs.exe" security=authnoencap action=allow
Add an outbound rule for port 80:
netsh advfirewall firewall add rule name="allow80" protocol=TCP dir=out localport=80 action=block
Add an inbound rule requiring security and encryption for TCP port 80 traffic:
netsh advfirewall firewall add rule name="Require Encryption for Inbound TCP/80" protocol=TCP dir=in localport=80 security=authdynenc action=allow
Add an inbound rule for messenger.exe and require security
netsh advfirewall firewall add rule name="allow messenger" dir=in program="c:\program files\messenger\msmsgs.exe" security=authenticate action=allow
Add an authenticated firewall bypass rule for group acmedomain\scanners identified by a SDDL string:
netsh advfirewall firewall add rule name="allow scanners" dir=in rmtcomputergrp=<SDDL string> action=bypass security=authenticate
Add an outbound allow rule for local ports 5000-5010 for udp-
Add rule name="Allow port range" dir=out protocol=udp localport=5000-5010 action=allow
FAQs
Utility to generate a batch file to manage inbound and outbound Windows firewall connections for a single exe file or all exe files in folder
The npm package netsh-rule receives a total of 0 weekly downloads. As such, netsh-rule popularity was classified as not popular.
We found that netsh-rule demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.