Tutorial deactivating the ICMP service under Windows 7
ICMP is a program or service that is used for PING or received PINGs. If the user has ever known about a program called Netcut that is used to break WiFi connections, the program will use the ICMP service to do it and apply it to the destination not just once but hundreds of times rendering uncontrollable many packets from other users due to the reception. Then there is another program that mentions Anti-Netcut or ARP-Spoof, it also blocks ICMP at this point and only temporarily.
Even though you are not using the utility, Users can still manually disable the ICMP process using the firewall feature what’s on Windows. For now, I’m only going to release specifically for Windows 7 and that’s very easy. WiFi connections are not all dangerous, but in fact most are very dangerous and users need an intermediary like a VPN so that data is not lost through theft using the ARP poisoning method to a fake gateway where the IP gateway is can get the data you want when the target is browsing.
This ICMP service should not be disabled forever as it is still needed to play LAN games. Hence, it is better to turn it off when using a WiFi connection just to keep it safe and convenient when using it. As long as this ICMP service is disabled, all others trying to PING the current user’s IP will be blocked, which means that it has failed. This corresponds to switching off the ICMP service on the router itself in order to prevent the WLAN bandwidth from being continuously sucked up.
This ICMP service is divided into 2 forms, namely: ICMPv4 and ICMP6, the brief explanation is almost the same as for IPv4 and IPv6 and only differs in how they are used. Before I discuss the procedure, here I am going to disable the ICMP feature for inbound rather than outbound so that users can still ping any IP / host, but other people or bots cannot ping the current user’s IP. OK, this is how you deactivate the ICMP service in Windows 7.
Please turn on the PC first and just click on BEGINNING and type “Windows Firewall with Advanced Security“And ENTER.
Then a popup will appear and please click on the menu Incoming rules.
Now it targets the processes that were turned on and off by Windows, just click the menu New rule what’s top right.
A popup appears and several options, please select in the section Custom. Then click Next.
Next, please select All programs and click Next.
Now pay attention to the Protocol type, please select as ICMPv4 and click the Next button.
For this section, 2 options are shown with large columns, please select as Any IP address on both options and click Next.
Now is the time to block the service by removing the Block the connection and click Next.
Then the options appear again, please check everything, namely Domain, private and public and click Next.
The last step, please enter a name for this rule, please fill it out ICMPv4 block and click Finish.
It is still not ready, now the user does it exactly the same again, it is just that in the Protocol type section please enter ICMPv6.
It looks like there’s a lot to do, but that’s just by looking. And when the user tries the above method, it will be very simple and understandable. So how do you get it back to normal? It’s very simple, the user simply deletes the two rules that were created, namely ICMPv4 and ICMPv6, and after that it can definitely be used again to receive packets from other IPs.
This method is very safe as long as you correctly follow the directions above. The most important thing is to disable ICMP in the Inbound Rules section because if you do this with Outbound Rules the user will not be able to PING the host. Actually, however, ICMPv4 is sufficient To make it even better, you should also enable ICMPv6. This way, the WiFi connection definitely no longer interferes with the use of Netcut and you can avoid spies who use the tools to get to the login details of users. Possible Some people will not believe that this WiFi connection can be bugged, but that can be done with the help of programs, even on smartphones like Android you can easily tap on WiFi connections with applications like DroidSheep.
Hopefully useful and good luck