Microsoft released new version of Attack Surface Analyzer utility

Version 1.0 was released seven years ago, and now technical giant announced Attack Surface Analyzer 2.0.

This instrument fixes changes in Windows system in the process of side applications installation.

In the last seven years a bulk of system administrators and researchers routinely used years Attack Surface Analyzer that became practically indispensable tool.

Possibility of tracing changes in configuration of operation system, allowed specialists detect potential risks for security as mark suspicious applications before they would do serious damage.

Read also: For protection from similar to WannaCry worm Microsoft released updates for old Windows versions

Moreover, Attack Surface Analyzer gained popularity among applications developers, especially in testing. Tool allowed program creators find bugs and make patches before official release.

“Fans of the old Attack Surface Analyzer 1.0 release can still get the older version — now known as the “classic” version — from Microsoft’s main download center”, — said developers.

New Attack Surface Analyzer 2.0 is now available of GitHub, where Microsoft opened source code and involved in the process of development for all participants

This tool with an open source code, created with the use of .NET Core, that works in Linux, macOS and Windows.

The tool is needed, Microsoft’s announcement explained, “because most installation processes require elevated privileges, which can lead to undesired system configuration changes“.

Currently, the criteria that can be selected include:

  • File System
  • User Accounts
  • System Services
  • Network Ports (listeners)
  • System Certificate Stores
  • Windows Registry

Other criteria may get added to the tool in the near future.


About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

MageCart on the Heroku Cloud Platform

Researchers Found Several MageCart Web Skimmers On Heroku Cloud Platform

Researchers at Malwarebytes reported about finding several MageCart web skimmers on the Heroku cloud platform …

Android Spyware CallerSpy

CallerSpy spyware masks as an Android chat application

Trend Micro experts discovered the malware CallerSpy, which masks as an Android chat application and, …

Leave a Reply