Microsoft releases new version of Attack Surface Analyzer utility

0
183

Seven years after releasing version 1.0, Microsoft has published version 2.0 of its Attack Surface Analyzer utility, a tool that logs the changes made to a Windows OS during the installation of third-party applications.

Released at the end of April, Attack Surface Analyzer 2.0 marks the end of a long development cycle during which Microsoft engineers rewrote the utility using .NET Core and Electron, two cross-platform technologies; meaning the tool now also runs on macOS and Linux, besides Windows.

Over the last seven years, the tool has had an essential role in the daily work of system administrators and malware hunters. Its ability to track changes made to an operating system’s configuration helped many professionals identify potential security risks and flag suspicious apps before they got any chance of doing serious damage.

Furthermore, the tool was also popular with app developers, especially in the testing phase, helping many app makers identify and patch buggy code that could have ended up in crashing end-users systems.

Where to download

The new Attack Surface Analyzer 2.0 is now available on GitHub, where Microsoft has open-sourced the code and opened the development process to any contributors.

Fans of the old Attack Surface Analyzer 1.0 release can still get the older version — now known as the “classic” version — from Microsoft’s main download center.

How to use the new tool

The new Attack Surface Analyzer 2.0 is pretty straightforward to use. The entire tool is just two sections — one for scanning a system, and one for displaying the results.

The scan section supports two types of scans, a static scan, and a live monitoring mode.

Static scans can be used to detect changes made between a before and after state. Users are supposed to scan a system before installing an app, and after the app’s installation. This will produce a report showing the changes between the two states.

The second scan mode is called Live Monitoring, and as the name suggests, records changes made to a Windows OS in real time.

Attack Surface Analyzer 2.0 Scan tab

Attack Surface Analyzer 2.0 Scan tab

Image: Microsoft

The Results section lists changes made to various key areas of a Windows OS, such as:

File SystemNetwork Ports (listeners)System ServicesSystem Certificate StoresWindows RegistryUser Accounts

Attack Surface Analyzer 2.0 Results tab

Attack Surface Analyzer 2.0 Results tab

Image: Microsoft

Besides the Electron-based GUI app, Microsoft engineers have also released an improved CLI tool that can be used as part of automated toolchains.

Attack Surface Analyzer 2.0 CLI

Attack Surface Analyzer 2.0 CLI

Image: Microsoft

Related cybersecurity coverage:

Hackers are collecting payment details, user passwords from 4,600 sitesMicrosoft recommends using a separate device for administrative tasksMicrosoft SharePoint servers are under attackSHA-1 collision attacks are now actually practical and a looming dangerMicrosoft Office 365: Change these settings or risk getting hacked, warns US govtFuture Android versions to support Electronic IDs Why cybersecurity pros want to share information to combat threats TechRepublicGoogle takes aim at imposter websites with new Chrome warning CNET

Related Topics:

Microsoft

Security TV

Data Management

CXO

Data Centers