Updated Home (markdown)

Gabe Stocco 2020-04-14 15:38:28 -07:00
Родитель b71cea878a
Коммит 6adcdd2444
1 изменённых файлов: 12 добавлений и 7 удалений

19
Home.md

@ -1,14 +1,14 @@
# Welcome to the Attack Surface Analyzer wiki!
## Attack Surface Analyzer 2.1 Is Now Available
The project master branch is now moved up to 2.2 for ongoing improvements.
## Attack Surface Analyzer 2.2 Beta Is Now Available
The project master branch is now moved up to 2.3 for ongoing improvements.
## Why Attack Surface Analyzer
Attack Surface Analyzer (ASA) is a Microsoft-developed Security tool that analyzes the attack surface of a Windows 10, Linux or MacOS system and reports on system changes that may have potential security implications that are introduced by the installation of software or by system misconfiguration.
Attack Surface Analyzer 1.0 [classic](https://www.microsoft.com/en-us/download/details.aspx?id=24487) from Microsoft was released in 2012 and while still available it is no longer supported. Attack Surface Analyzer 1,.0 has been valuable to software developers and IT security personnel for years in helping detect key system changes that may occur from software installation.
Attack Surface Analyzer 2.1 is a rewrite from the ground up on Microsoft .NET Core and Electron and is deployed as Open Source for contribution and customization. Note: the official or master branch of the code is still managed by Microsoft.
Attack Surface Analyzer 2 is a rewrite from the ground up on Microsoft .NET Core and is an Open Source project managed by Microsoft.
### Scenarios
1. Attack Surface Analyzer can help identify potential security risks exposed through changes to services, user accounts, files, network ports, certificate stores, and the system registry. It also includes some support for “live” monitoring of certain system changes (i.e. file system and registry).
@ -21,7 +21,7 @@ Attack Surface Analyzer 2.1 is a rewrite from the ground up on Microsoft .NET Co
# How to Run Attack Surface Analyzer
## Overview
Attack Surface Analyzer 2.1 comes with both a command line (CLI) or an browser based (GUI) option making it easy to use as part of a testing or release script or for standalone use. When using it, you create “snapshots” before and after you install the target software under consideration for analysis. A clean initial system with minimal additional software is ideal, but not required. Snapshots are stored in a local SQLite database and used to generate reports of system changes.
Attack Surface Analyzer 2 comes with both a command line (CLI) or an browser based (GUI) option making it easy to use as part of a testing or release script or for standalone use. When using it, you create “snapshots” before and after you install the target software under consideration for analysis. A clean initial system with minimal additional software is ideal, but not required. Snapshots are stored in a local SQLite database and used to generate reports of system changes.
You can also scan for changes after the software is used or while it is running to potentially capture additional changes made to the system.
@ -40,7 +40,7 @@ elements are collected in the baseline and subsequent scans.
#### Startup
- Windows, open an Administrator Command Prompt or Powershell and run ```Asa.exe gui```.
- Mac OS/Linux, use sudo - ```sudo AsaLaunchGui.sh``` or launch Asa directly with ```sudo Asa gui```.
- Mac OS/Linux, use ```sudo Asa gui```.
#### Operating
- Once you have started Attack Surface Analyzer it should automatically launch a browser window in your system default browser to `http://localhost:5000` with the application.
@ -74,7 +74,7 @@ Note that analyzer has high CPU and disk I/O demands, and may take a considerabl
ASA is tested on Windows 10, Linux and MacOS systems. No installed pre-requisites or redistributables are required, beyond those of .NET Core.
Our core technologies are .NET Core 3.1. No other systems are tested at present but .NET Core is supported on the following versions of Windows:
Our core technologies are ASP.NET and .NET Core 3.1. No other systems are tested at present but .NET Core is supported on the following versions of Windows:
* Windows 7 SP1
* Windows 8.1
* Windows 10 Anniversary Update (version 1607) or later versions
@ -87,6 +87,11 @@ Additional OS compatibility for .NET Core is located here https://github.com/dot
## Installation
### Nuget Packages
Attack Surface Analyzer is distributed on Nuget in [CLI](https://www.nuget.org/packages/Microsoft.CST.AttackSurfaceAnalyzer.CLI/) and [Library](https://www.nuget.org/packages/Microsoft.CST.AttackSurfaceAnalyzer/) form.
If you have .NET Core installed, you can install Attack Surface Analyzer with `dotnet tool install -g Microsoft.CST.AttackSurfaceAnalyzer.CLI`.
### Binaries
The application does not come with an installation program but binaries are provided with each release branch update for convenience and can be downloaded for immediate use or you may build the source code and run it. Pre-built binaries are located under [releases](https://github.com/Microsoft/AttackSurfaceAnalyzer/releases).
@ -94,7 +99,7 @@ The application does not come with an installation program but binaries are prov
ASA does not add or change any environment variables. If you believe it has done so, check if it is an issue we've already identified.
## For Previous Users of Attack Surface Analyzer
Note that .cab files generated from versions of Attack Surface Analyzer are not compatible with Attack Surface Analyzer 2.0. You will need to run a new baseline and product scan to perform the analysis.
Note that .cab files generated from versions of Attack Surface Analyzer are not compatible with Attack Surface Analyzer 2. You will need to run a new baseline and product scan to perform the analysis.
# Support
For submitting defects, just use the standard GitHub Issues link.