<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: ReiPenguin</title>
    <description>The latest articles on DEV Community by ReiPenguin (@reipenguin).</description>
    <link>https://dev.to/reipenguin</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1081247%2F6e0a558f-8dbf-4663-ab24-63e2ff203810.jpeg</url>
      <title>DEV Community: ReiPenguin</title>
      <link>https://dev.to/reipenguin</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/reipenguin"/>
    <language>en</language>
    <item>
      <title>Check Windows Vulnerabilities Right Now with Vuls!</title>
      <dc:creator>ReiPenguin</dc:creator>
      <pubDate>Tue, 16 May 2023 10:24:53 +0000</pubDate>
      <link>https://dev.to/reipenguin/check-windows-vulnerabilities-right-now-with-vuls-i5g</link>
      <guid>https://dev.to/reipenguin/check-windows-vulnerabilities-right-now-with-vuls-i5g</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Hi, I'm Rei, an engineer at Future Corporation.&lt;br&gt;
I'm currently responsible for development and support at &lt;a href="https://vuls.biz/en"&gt;FutureVuls&lt;/a&gt;, a vulnerability management cloud service.&lt;br&gt;
In this post, I would like to introduce &lt;strong&gt;a new feature of "Vuls,"&lt;/strong&gt; an open-source software that our team maintains.&lt;/p&gt;
&lt;h2&gt;
  
  
  Vulnerability Detection
&lt;/h2&gt;

&lt;p&gt;How do you check for &lt;strong&gt;vulnerabilities&lt;/strong&gt; in your company's servers and software? Leaving vulnerabilities unaddressed can pose a significant risk of cyberattacks and result in significant damages to the company.&lt;br&gt;
Therefore, it is essential to take measures to address them.&lt;br&gt;
However, vulnerability management that involves manual information gathering and impact investigation can be overwhelming and cause frustration.&lt;/p&gt;

&lt;p&gt;Try using &lt;strong&gt;Vuls&lt;/strong&gt; in such situations, our solution to this problem.&lt;br&gt;
&lt;a href="https://github.com/future-architect/vuls"&gt;Vuls&lt;/a&gt; is a tool that automatically detects vulnerabilities in servers and software by consolidating information from various sources, such as OVAL, SecurityTracker, NVD, and JVN vulnerability databases.&lt;/p&gt;

&lt;p&gt;Moreover, our commercial vulnerability management cloud service, &lt;strong&gt;FutureVuls&lt;/strong&gt;, provides features like automatic risk assessment of detected vulnerabilities and differential management through ticketing, enabling you to automate the entire vulnerability management process.&lt;/p&gt;

&lt;p&gt;We're proud to share that Vuls has nearly 10,000 stars on GitHub!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--22kWZvja--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://user-images.githubusercontent.com/125429835/233284542-d16feeca-d88e-4924-a58f-a4b21c2c2bb0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--22kWZvja--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://user-images.githubusercontent.com/125429835/233284542-d16feeca-d88e-4924-a58f-a4b21c2c2bb0.png" alt="" width="300" height="100"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Until now, Vuls did not support Windows.&lt;/p&gt;

&lt;p&gt;According to a report by the Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) in the United States, in 2021, more than half of the top 15 vulnerabilities frequently used in cyber attacks were related to Windows.&lt;br&gt;
Therefore, it is crucial to focus on updating Windows and managing vulnerabilities, but there are very few open-source vulnerability scanners for Windows that are continuously maintained.&lt;/p&gt;

&lt;p&gt;"Do I have to buy the commercial version to detect vulnerabilities on Windows? Is this the limit of open-source software?"&lt;br&gt;
You might have been struggling like this, but we have good news for you!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Windows scanning functionality that was previously only available for the cloud service version has been ported to allow OSS Vuls to scan Windows as well.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To introduce this new feature, we will try scanning Windows servers in this article!&lt;/p&gt;
&lt;h2&gt;
  
  
  Trying vulnerability scanning with Vuls on a Windows server
&lt;/h2&gt;

&lt;p&gt;I am going to create a Vuls execution environment on a Windows server and try server scanning.&lt;br&gt;
The target server for this is a Windows Server 2012 that I have at home.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The execution steps are as follows:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Obtain the Vuls vulnerability scanning tool and the Gost vulnerability database creation tool.&lt;/li&gt;
&lt;li&gt;Execute Gost to create a database for detecting vulnerabilities on Windows.&lt;/li&gt;
&lt;li&gt;Execute &lt;code&gt;vuls.exe scan&lt;/code&gt; and &lt;code&gt;vuls.exe report&lt;/code&gt; to perform the vulnerability scan and check the results.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It's amazing that vulnerability detection can be done with just these steps, it's so simple!&lt;br&gt;
Let's take a look at the actual operational procedures below.&lt;/p&gt;
&lt;h3&gt;
  
  
  Obtaining the tools
&lt;/h3&gt;

&lt;p&gt;Download the executable file from the GitHub repository according to your environment.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;vuls : Select the latest version of the vuls executable from &lt;a href="https://github.com/future-architect/vuls/releases"&gt;here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;gost : Select the latest version of the gost executable from &lt;a href="https://github.com/vulsio/gost/releases"&gt;here&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Create vulnerability database for detection
&lt;/h3&gt;

&lt;p&gt;We will create a database locally to detect vulnerabilities on Windows.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;gost.exe fetch microsoft
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Create a configuration file (config.toml) for the scan, and define the path to the database created here.&lt;br&gt;
(Please adjust the part of sqlite3Path according to your own environment)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# config.toml &lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;gost]
&lt;span class="nb"&gt;type&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"sqlite3"&lt;/span&gt;
sqlite3Path &lt;span class="o"&gt;=&lt;/span&gt;  &lt;span class="s2"&gt;"C:&lt;/span&gt;&lt;span class="se"&gt;\\&lt;/span&gt;&lt;span class="s2"&gt;Users&lt;/span&gt;&lt;span class="se"&gt;\\&lt;/span&gt;&lt;span class="s2"&gt;User&lt;/span&gt;&lt;span class="se"&gt;\\&lt;/span&gt;&lt;span class="s2"&gt;vuls&lt;/span&gt;&lt;span class="se"&gt;\\&lt;/span&gt;&lt;span class="s2"&gt;gost.sqlite3"&lt;/span&gt;  &lt;span class="c"&gt;# Edit here&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;servers]
&lt;span class="o"&gt;[&lt;/span&gt;servers.localhost]
host &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"localhost"&lt;/span&gt;
port &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"local"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Execute scan and report
&lt;/h3&gt;

&lt;p&gt;With the above steps, the preparation for Windows scan is completed!&lt;br&gt;
Let's perform the scan.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;vuls.exe scan
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The scan results will be displayed.&lt;/p&gt;

&lt;p&gt;Let's display the list of detected vulnerabilities.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;vuls.exe report
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--tBoAKPdi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://user-images.githubusercontent.com/125429835/233284660-594495ce-c800-49f2-a1b9-a5f24949445c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--tBoAKPdi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://user-images.githubusercontent.com/125429835/233284660-594495ce-c800-49f2-a1b9-a5f24949445c.png" alt="" width="800" height="682"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The detected vulnerabilities on your server and their CVSS scores were displayed in tabular format.&lt;/p&gt;

&lt;p&gt;Windows updates are provided in units of KB, but it can be cumbersome to associate KB with CVSS scores and other information on the internet.&lt;br&gt;
With Vuls, vulnerabilities contained in unapplied KBs are expanded into CVEs and their CVSS scores are displayed, making it easier to determine whether or not to address them.&lt;/p&gt;

&lt;p&gt;Note that items with evaluation of 0.0 or '?' are those without CVSS scores set.&lt;/p&gt;

&lt;p&gt;It's convenient to be able to automate the usual cumbersome vulnerability detection process with simple setup steps! The final output is presented in a table format, which makes it very easy to read.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion: Vuls is the Go-To Vulnerability Scanner
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Vuls scanner is a free and open-source tool&lt;/strong&gt; that anyone can use. In this article, we introduced how to use Vuls for Windows scanning, but Vuls is compatible with various operating systems. Please make use of it as one of the tools for vulnerability detection.&lt;/p&gt;

&lt;p&gt;However, simply finding vulnerabilities is not enough. Vulnerability response involves appropriately addressing the risks based on their severity. The cloud-based version of &lt;a href="https://vuls.biz/en"&gt;FutureVuls&lt;/a&gt; supports for vulnerabilities detected by Vuls, from automatic determination of response priority to resolution.&lt;/p&gt;

&lt;p&gt;This is the end of my introduction to Windows scan using the open-source Vuls tool.&lt;/p&gt;

&lt;p&gt;Thank you!!&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>security</category>
      <category>tutorial</category>
      <category>vuls</category>
    </item>
  </channel>
</rss>
