Thursday, December 2, 2021
HomeDaily updatesEasiest way to find vulnerability in Windows within 5 minutes

Easiest way to find vulnerability in Windows within 5 minutes

Windows is the most popular operating system. Because of its easy usability, easy to understand its features. Most usage of this operating system makes it more vulnerable, according to an Ethical hacking researcher of the International Institute of Cyber Security, Windows does have many vulnerabilities which makes an question if Windows is secure or not. Today we will show a python script designed to find vulnerabilities.

Windows Exploit Suggester – Next Generation (WES-NG):

WES-NG is a python tool that discovers vulnerabilities including the available exploits information for the discovered vulnerabilities on the system by analyzing the output of Windows’ systeminfo utility. You can use this Python tool to find and fix the vulnerabilities on any Windows desktop operating system from Windows XP to Windows 10 and server operating system from Windows server 2003 to Windows server 2019.

How does Windows Exploit Suggester – Next Generation (WES-NG) work?

As we said earlier, WES-NG users the built-in utility ‘systeminfo.exe‘. If you don’t know about systeminfo, it is a command-line utility used to print the detailed system information. It prints information about the processor, ram,  operating system, network cards, BIOS, system boot, and there are a plethora of things. WES-NG uses this information as input and checks for the associated vulnerabilities in its database. Its database is considered more accurate than Microsoft’s as it reefers multiple sources to create a comprehensive database. In its report, it shows which vulnerabilities were found on the system. Their CVV ID, associated services, available exploits, and how to fix them.

 

Pros & Cons of Windows Exploit Suggester – Next Generation (WES-NG):

Cons:

The important thing to note is that it doesn’t scan the system to determine the vulnerabilities. It just provides the list of vulnerabilities based on the version, build, and patch installed on the machine. You can see the manually fixed vulnerabilities in the list as it doesn’t scan the system for vulnerabilities. This makes it less accurate and you may see a few false positives either. None of the tools available in the market is perfect, right?

Pros:

However, it gives the result in no time. It’s totally free to use. It doesn’t take a lot of time to give results, unlike other tools. It’s a perfect tool for a quick check. No technical knowledge is required to run the tool. All these properties will make this tool perfect for individual users and small businesses.

Sources from were Windows Exploit Suggester – Next Generation (WES-NG) collects the updates:

It gathers the data from these three sources. So this makes it more valuable.

  • Microsoft Security Bulletin: KB articles for older systems
  • MSRC: The Microsoft Security Update API of the Microsoft Security Response Center (MSRC): Standard source of information for modern Microsoft Updates
  • NIST National Vulnerability Database (NVD): Complement vulnerabilities with Exploit-DB links These are combined into a single .csv file which is compressed and hosted on GitHub repository.

 

How to quickly find and fix vulnerabilities on Windows?

Step #1: Clone the Git repo or just download the code from the Github: https://github.com/bitsadmin/wesng

  1. Step #1:

    Clone the Git repo or just download the code from the Github: https://github.com/bitsadmin/wesng

  2. Step #2:

    Navigate to the location where it is stored. In my case I have stored it in: C:\Windows\System32\cmd.exe

  3. Step #3

    Run the wes.py script from Python. Download and install the Python from Python.org if Python is not installed on your machine.  It is a very easy, simple, and direct procedure to install Python on the Windows machine. Make sure to add Python to the PATH. This creates a PATH environment variable to run the Python script.

  4. Step #4:

    Install chardet library.
    > pip install chardet

  5. Step #5:

    Store the systeminfo output to a file. Use ‘>’ symbol to store the output of the systeminfo command.
    > systeminfo > sysinfo.txt

  6. Run the wes.py script using Python.Symtex to run the script is:
    Python wes.py full path of ‘sysinfo.txt
    > python wes.py sysinfo.txt

 

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments