Skip to content

Security: KernFerm/Network-Reset-Utility

Security

SECURITY.md

Security Policy

πŸ”’ Security Overview

The Network Reset Utility is designed with security as a primary concern. This document outlines the security measures implemented and provides guidelines for safe usage.

πŸ›‘οΈ Security Features

Administrator Privilege Management

  • Auto-elevation: Automatically requests Administrator privileges through Windows UAC
  • Privilege verification: Validates administrator access before executing critical operations
  • Secure execution: Uses PowerShell's Start-Process -Verb RunAs for safe privilege escalation

Input Validation & Sanitization

  • User input sanitization: All user inputs are properly sanitized and validated
  • Input length limiting: User responses are limited to single character inputs
  • Case-insensitive processing: Prevents bypass attempts through case manipulation

Error Handling & Recovery

  • Graceful failure handling: Script continues operation even if individual components fail
  • Safe fallback mechanisms: Alternative methods attempted when primary operations fail
  • Process isolation: Each network operation is isolated to prevent cascading failures

⚠️ Security Considerations

What This Script Does

  • Resets Windows network stack components
  • Modifies system-level network configurations
  • Requires and uses Administrator privileges
  • Temporarily disrupts network connectivity
  • Accesses Windows system directories and services

Potential Security Implications

  • Temporary network disruption: May temporarily disconnect internet access
  • Firewall reset: Restores Windows Firewall to default settings
  • Network service restart: Stops and starts critical network services
  • System file access: Writes to system temporary directories for verification

πŸ” Safe Usage Guidelines

Before Running

  1. Close sensitive applications that require network access
  2. Save all work as network connectivity will be temporarily interrupted
  3. Ensure alternative internet access (mobile hotspot) is available if needed
  4. Run from a trusted location - avoid running from temporary or downloaded folders

During Execution

  1. Do not interrupt the script while it's running
  2. Allow UAC prompts when requested
  3. Monitor the output for any unexpected errors
  4. Wait for completion before using network applications

After Completion

  1. Restart your computer as recommended
  2. Verify network connectivity before resuming sensitive operations
  3. Check firewall settings if you had custom configurations
  4. Test all network-dependent applications

🚨 Security Warnings

β›” Do NOT run this script if:

  • You are currently in a remote session (RDP, TeamViewer, etc.)
  • You are performing critical network-dependent tasks
  • You don't have physical access to the computer
  • You are unsure about the source or integrity of the script
  • Your system is part of a managed domain without IT approval

⚠️ Exercise caution if:

  • You have custom firewall rules that need to be preserved
  • You are using VPN connections that may be disrupted
  • You have specialized network configurations
  • You are on a business or enterprise network

πŸ” Code Transparency

What Makes This Script Safe

  • Open source: All code is visible and auditable
  • No external downloads: Script doesn't download or install anything
  • Uses built-in Windows tools: Only uses native Windows commands
  • No data collection: Doesn't send any information externally
  • No persistence: Doesn't create permanent system changes beyond network reset

Commands Used

The script only uses these trusted Windows commands:

  • netsh - Network shell utility
  • ipconfig - IP configuration utility
  • net - Network service management
  • timeout - Delay utility
  • Standard batch file commands

πŸ“‹ Reporting Security Issues

If you discover a security vulnerability or have concerns:

  1. Do not open a public issue for security vulnerabilities
  2. Contact the maintainer directly with details
  3. Provide steps to reproduce if applicable
  4. Include your Windows version and relevant system information

πŸ”„ Security Updates

This script will be updated if:

  • Security vulnerabilities are discovered
  • New Windows security features need to be accommodated
  • Additional safety measures are identified
  • User feedback indicates security concerns

βœ… Security Checklist

Before using this script, ensure:

  • You have Administrator privileges
  • You understand what the script does
  • You have saved all important work
  • You have alternative internet access if needed
  • You are not in a remote session
  • You have physical access to the computer
  • You trust the source of this script

πŸ“š Additional Resources


Remember: This script is a powerful network administration tool. Use it responsibly and only when necessary.

There aren’t any published security advisories