EMET 5.5 Released
Microsoft announced on the TechNet blog the availability of a new version of its EMET tool (EMET stands for "Enhanced Mitigation Experience Toolkit"). The purpose of this tool is to implement extrat security controls to prevent common vulnerabilities in software like: DEP ("Data Execution Prevention"), ASLR ("Address Space Layout Randomization") or certificate trust (Pinning).
The new release introduces the following changes:
- Compatibility with Windows 10
- Improved deployment and configuration via GPO
- Improved writing of the mitigations to the registry
- EAF/EAF+ pseudo-mitigation performance improvements
- Support for untrusted fonts mitigation in Windows 10
More info about configuration guidelines is available here.
Xavier Mertens
ISC Handler - Freelance Security Consultant
PGP Key
Automating Vulnerability Scans
- get-targets
- get-tasks
- create-tasks
- start-tasks
The number of action is quite limited and allow only basic tasks. But it provides the “-X” or "--xml” argument which allows us to send raw XML data to the server! This is much more powerful! (a complete reference is available here). To use omp, the very first step is to create a configuration file to automate the connection. Create a $HOME/omp.config file like this:
[Connection] host=127.0.0.1 port=9390 username=xavier password=mystrongpassword
$ omp --pretty-print --xml "<get_targets/>" <get_targets_response status_text="OK" status="200"> <target id="dcc82d64-1c87-44d8-aef5-24c1f552ddcd"> <owner> <name>xavier</name> </owner> <name>Local Hosts</name> <comment></comment> <creation_time>2016-02-02T22:12:08+01:00</creation_time> <modification_time>2016-02-02T22:12:08+01:00</modification_time> <writable>1</writable> <in_use>1</in_use> <permissions><permission> <name>Everything</name> </permission></permissions> <user_tags> <count>0</count> </user_tags> <hosts>192.168.254.0/24</hosts> <exclude_hosts></exclude_hosts> <max_hosts>254</max_hosts> <port_list id="c7e03b6c-3bbe-11e1-a057-406186ea4fc5"> <name>OpenVAS Default</name> <trash>0</trash> </port_list> <ssh_lsc_credential id=""> <name></name> [... stuff removed ...]
- Create a target
- Create a tasks (and assign the target to it)
- Start the task
- Get results
$ omp --xml ' <create_target> <name>My New Scan</name> <hosts>192.168.254.0/24</hosts> </create_target>' <create_target_response id="dcc82d64-1c87-44d8-aef5-24c1f552ddcd" status_text="OK, resource created" status="201"></create_target_response>
$ omp --xml ‘...’ | xmlstarlet sel -t -v /create_target_response/@id dcc82d64-1c87-44d8-aef5-24c1f552ddcd
$ omp --xml ' <create_task> <name>My New Scan</name> <preferences> <preference> <scanner_name>source_iface</scanner_name> <value>eth0</value> </preference> </preferences> <config id="74db13d6-7489-11df-91b9-002264764cea"/> <target id="dcc82d64-1c87-44d8-aef5-24c1f552ddcd"/> </create_task>' <create_task_response id="8fc4cccd-243f-4edb-a390-5f83d04f90b6" status_text="OK, resource created" status="201"></create_task_response>
$ omp --xml ‘<get_tasks/>'
$ omp —xml ‘<start_task task_id="8fc4cccd-243f-4edb-a390-5f83d04f90b6"/> <start_task_response status=“200" status_text="OK"/>
$ omp --xml ' <get_reports report_id="cc995c30-0a5d-486d-a02f-a03eba63172a" format_id="c402cc3e-b531-11e1-9163-406186ea4fc5”/>’
Comments