A forum for reverse engineering, OS internals and malware analysis 

Forum for announcements and questions about tools and software.
 #4583  by GamingMasteR
 Thu Jan 20, 2011 2:40 pm
Attack Surface Analyzer is developed by the Security Engineering group, building on the work of our Security Science team. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software.

Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface.

This allows:
- Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform
- IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications
- IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews
- IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase)
* Supported Operating Systems:Windows 7;Windows Server 2008;Windows Vista
http://www.microsoft.com/downloads/en/d ... 352a5e7d45

I didn't try it yet ...
 #4602  by mzneo
 Fri Jan 21, 2011 4:55 am
One more tool of same kind - from MS

Description
BinScope checks that SDL-required compiler/linker flags are being set, strong-named assemblies are in use, up-to-date build tools are in place, and the latest good ATL headers are being used. BinScope also reports on dangerous constructs that are prohibited by SDL
http://www.windows7download.com/win7-bi ... wckzi.html