Skip to content

Instantly share code, notes, and snippets.

@nconder
Last active March 6, 2018 04:42
Show Gist options
  • Save nconder/e63a5f6246d8b5647725 to your computer and use it in GitHub Desktop.
Save nconder/e63a5f6246d8b5647725 to your computer and use it in GitHub Desktop.
glasshole.bat
@echo off
ECHO Created by Opulent Computing
ECHO Version 0.1
ECHO glasshole.bat with Windows Server 2012 R2, 2012, 2008 R2, 2008 DHCP Server.
ECHO This batch fill will block any device with in the a MAC address range from obtaining an IP from the servers.
ECHO We assume you already have a Windows Server 2012 R2, 2012, 2008 R2, 2008 DHCP Server running.
ECHO Save this file to your Windows Server and run with Administrative privileges
ECHO You may also do this via the DHCP Server GUI.
ECHO enable the deny list filter
netsh dhcp server v4 set filter EnforceAllowList=0 EnforceDenyList=1
ECHO Setting the range and description to block. In this case any G00gle glass h0le devices
netsh dhcp server v4 add filter deny F8-8F-CA-24-*-* "glasshole-1"
netsh dhcp server v4 add filter deny F8-8F-CA-25-*-* "glasshole-2"
ECHO All done bye!
@nconder
Copy link
Author

nconder commented Sep 9, 2014

glasshole.bat with Windows Server 2012 R2, 2012, 2008 R2, 2008 DHCP Server.

This batch fill will block any device with in the a MAC address from glasshole.sh range from obtaining an IP from the Windows DHCP Server.

This batch script has been tested on Windows Server 2012 R2 and 2012.

!!!!!It may still be possible for the g00gle glass device to get on your network by them knowing the subset and entering a static ip on the device.!!!!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment