Microsoft Releases Attack Surface Analyzer Tool 40
wiredmikey writes "Microsoft has released the public version of Attack Surface Analyzer, a tool designed to help software developers and independent software vendors assess the attack surface of an application or software platform. The tool was pushed out of beta with Version 1.0 released on Thursday. Since ASA doesn't require the original source code, managers and executives can also use the tool to determine how a new application or software being considered would affect the organization's overall security before deploying it. The tool takes snapshots of the system before and after an application was installed, and compares them to identify changes made when new applications were installed. A stand-alone wizard guides users through the scanning and analysis process and a command-line version is available for use with automated tools. Attack Surface Analyzer 1.0 can be downloaded from Microsoft here."
Attack Surface? (Score:5, Funny)
Geez, they haven't even shipped the thing yet.
Re: (Score:2)
New Naming Convention? (Score:3)
My first thought on seeing the title was WTF...Microsoft are releasing their own 0-day exploits ahead of a product launch?
I guess marketing should be careful next time to write some exclusions into their company-wide email requesting staff to spread the word Surface as widely as possible to get it into peoples' subconscious.
Re: (Score:2)
LOL (Score:1, Funny)
if they have been using it then it must not work well
Re: (Score:3)
First impression (Score:4, Insightful)
So I haven't yet tested it, but it sounds like a fancy interface to netstat, diff, and a wee bit of HijackThis thrown in for good measure. From the download site:
Some of the checks performed by the tool include analysis of changed or newly added files, registry keys, services, Microsoft ActiveX controls, listening ports and other parameters that affect a computer's attack surface.
The actual assessment of an attack surface is far more complex than any single system, and there's a heavy user-education component that no automated tool can test. While I'm sure this will have some use for admins who don't run firewalls or are under typically-asinine requirements to describe in detail the impact of a package, it looks more useful for ensuring programs actually uninstall completely.
Re: (Score:2)
No safe and legal automated tool can test the user-education component...
Re: (Score:1)
Re: (Score:2)
Industrial robots without suitable safety interlocks are also pretty hard on careless or inattentive users, and much more productive!
Re: (Score:1)
For Windows (Score:2)
IT Security Auditors can use the tool to evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews ... ... ...
The tool takes snapshots of the system before and after an application was installed, and compares them to identify changes made when new applications were installed.
The tool also gives an overview of changes to the system that Microsoft considers important
The tool analyzes changed or newly added files, registry keys, services, ActiveX Controls, listening ports, access control lists and other parameters.
Analyzer does not appear to rely on signatures or try to exploit known vulnerabilities. Instead, it just looks at classes of security weaknesses where programs commonly fall short, or are exposed to attack vectors.
This is for Windows only and it does not test applications for security problems, it looks at the entire system and how it is affected by the installation.
Re:For Windows (Score:5, Informative)
This is for Windows only and it does not test applications for security problems, it looks at the entire system and how it is affected by the installation.
Hence, attack surface analyzer.
The tool looks at the surface of a system (not an application) and analyzes how observable changes to that surface could impact security. For instance it will report that a new port is listening after an application has been installed, or it reports that a certain application phones home, or that the application relies on configuration files/installation/registry keys which may not have proper permissions set.
Re: (Score:2)
This sounds like a threat to the Integrity and Security of the DRM systems that protect our precious software... Probably some kind of hacker 'circumvention device'.
Oh, you say it has a banal name and is released by a major vendor? Carry on then.
geez (Score:2)
already slashdotted. I think they need to work on scalability problems.
Attack Surface Tablet (Score:2)
Here's a seemingly obvious question (Score:1)
Why would an application developer need this because why would an application developer need to be modifying the OS at all? That just sounds like really bad design.
Re: (Score:3)
If that's the obvious question, you must know almost nothing about computers and/or software. Or your reading comprehension is gone missing.
No one said anything about changing the OS.
Re: (Score:2)
Missed my point apparently, so let me clarify: why would any app (not a system extension) need to modify the system registry in Windows? Sounds like bad design to me.
Re: (Score:2)
Do you have emotional problems, or are you just a bad person?
Maybe he has had to deal with code written by application developers who can't bother themselves to know how their apps affect (or depend on) their running environments. I would not blame him since that kind of experience is never pleasant.
Interesting (Score:2)
I've seen lots of stuff about Microsoft's upcoming Surface, but it didn't look different enough from normal tablets to get me interested. But an Attack Surface could be exciting. Does anybody have a link to a picture of this thing?
I imagine that it might be shaped something like a cricket bat with a shock resistant display on its blade. If so, that would be cool.
Is it just me.... (Score:2)
Re: (Score:2)
If it's a privilege escalation exploit, it's *always* the OS's fault. By definition.
After All (Score:2, Funny)
If anyone's going to know exploitable software, it's Microsoft.
no matter it is,,,it's only a market strategy (Score:1)