At Blackhat DC, Microsoft released a new tool called "Attack Surface Analyzer" beta, for ISVs and IT professionals to highlight the changes in system state, runtime parameters and securable objects on the Windows operating system. This analysis helps developers, testers and IT professionals identify increases in the attack surface caused by installing applications on a machine.
The tool takes snapshots of an organization's system and compares ("diffing") these to identify changes. The tool doesn't analyze a system based on signatures or known vulnerabilities; instead, it looks for classes of security weaknesses as apps are installed on Windows.
The tool also gives an overview of the changes to the system Microsoft considers important to the security of the platform and highlights these in the attack surface report. SDL requires development teams to define a given product's default and maximum attack surface during the design phase to reduce the likelihood of exploitation wherever possible. Additional information can be found in the Measuring Relative Attack Surface paper.
Some of the checks performed by the tool include analysis of changed or newly added files, registry keys, services, ActiveX Controls, listening ports, access control lists and other parameters that affect a computer's attack surface.
More Info: Download
[tags]blackhat,attack surface analyzer[/tags]