How to keep Personal Computer Secure from malware attack using Secunia Personal Software Inspector 3.0

secunai.pngIt has been very important to keep our Personal computer applications and software up-to-date unless it will be more prone to vulnerabilities and other malware attacks. Recently we have been hearing a lot about Ransomware “Wanna Cry” attack and its impact globally. If we have Personal computer users may be wondering how we can make our computer less prone to these attacks. Because we simply cannot rely on a firewall and antivirus to make our system guarded against all these vulnerabilities.

Application and OS vendors are constantly discovering security holes and releasing patches to fix them, but it’s not very easy for the user to install and update them.  That’s why we need some tool to make the task easy.

How PC users maintain their application with security updates that protect them from exploitation by hackers? Through Automation or tool right 🙂

I have come across tool  “Secunia Personal Computer Inspector (PSI)” from Flexera which is free security tool and the quite decent solution to identifies vulnerabilities in application and program installed on your personal computer where your antivirus solution could not be effective. It identifies programs and application in need of security updates to safeguard your PC against cybercriminals and it will analyze your computer and suggest necessary security updates and latest stable version as well.

Personal Software Inspector is a security scanner which identifies the program that is insecure and needs updates. It helps to automate and update the program and applications make a lot easier to make your system secure. It automatically detects insecure application and program, downloads the required patches and installs them accordingly without user interaction. If in case few updates require user interaction PSI also detects and notify the user about the program and show a notification when programs update are available.We just need to do few clicks with an appropriate icon in result windows to install the latest patches.

Personal Software Inspector (PSI) Features: 

  • Automatic updates of program 

The solution provides auto updates mechanisms to patch approximately 75 programs and application.

Auto_update.png

  • Available in 8 languages.

English, French, German,  Spanish, Arabic, Danish, Norwegian and Dutch.

language-setup

  • Covers programs from thousands of vendors.

Includes 20000+ programs and applications – more non-Microsoftt programs than anyone else vendor in the market.

List of few basic and standard application installed.

appapp-1app-2app-3

  • Integration for development.
  • Comprehensive Management Features

Automatically detect insecure program, download the require patches and install them without user interaction. Average personal computer with around 75 program and applications are covered.

Results-4

  • Reports Security Status for Each Program

Notifies about program and applications that can be automatically updated with the latest patch, notify appropriate icons in result windows when user interaction is required.

Results- filter.png

  • Detects End-of-life Programs

Detects and report End-of-Life programs and plug-ins. End-of- Life (EOL) programs are no longer supported by the vendor. The programs and applications with EOL will no longer receive security updates and treated as insecure, we should immediately remove them to make our PC secure.

Results-6

Download and install the latest version of PSI 3.0!

Advertisements

Microsoft & Non-Microsoft Patch Tuesday – May 2017

Microsoft Patch Tuesday

Microsoft Patch Tuesday released and has 56 CVE’s for the May 2017 which includes 15 CVEs rated “Critical”, 40 CVE’s rated “Important” and one rated “Moderate”. These updates affect software and services like Internet Explorer, Microsoft Edge Browser, Microsoft Windows, Microsoft Office and Microsoft Office Services and Web Apps,.NET Framework, Adobe Flash Player.

Summary :

  • No more Windows Vista patches.
  • Last few Windows 10 RTM release updates, Microsoft won’t be supported any more updates onwards.
  • Updates were released for all supported client and server versions of Windows.
  • Other Microsoft products with patches are Internet Explorer, Microsoft Edge, Microsoft Office, the Microsoft NET Framework, and Adobe Flash Player.

Microsoft also published Security Advisory 4010323 which says they will now deprecate SSL\TLS for IE11 and Edge Browser will no longer load sites with such certificates, you should upgrade from SHA-1 to SHA-2 to avoid warning messages and get the full-fledged use of it.

Microsoft Update: This change will only impact SHA-1 certificates that chain to a root in the Microsoft Trusted Root Program where the end-entity certificate or the issuing intermediate uses SHA-1. Enterprise or self-signed SHA-1 certificates will not be impacted, although we recommend that all customers quickly migrate to SHA-2 based certificates.

Security Update List

Cumulative Update for Windows 10 Version 1703 (KB4016871)
Cumulative Update for Windows 10 Version 1607 and Windows Server 2016 (KB4019472)
Cumulative Update for Windows 10 Version 1511 (KB4019473)
Cumulative Update for Windows 10 (KB4019474)
Security Update for Windows Server 2008 (KB4018196)
Cumulative Security Update for Internet Explorer (KB4018271)
Security Update for Windows Server 2008 and Windows XP Embedded (KB4018466)
Security Update for WES09 and POSReady 2009 (KB4018490)
Security Update for Windows Server 2008 and Windows XP Embedded (KB4018556)
Security Update for Windows Server 2008 (KB4018821)
Security Update for Windows Server 2008 (KB4018885)
Security Update for Windows Server 2008 (KB4018927)
May 2017 Security Only Update for.NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 on Windows Embedded Standard
7, Windows 7, and Windows Server 2008 R2 (KB4019108)
May 2017 Security Only Update for.NET Framework 2.0 on Windows Server 2008 (KB4019109)
May 2017 Security Only Update for.NET Framework 3.5, 4.5.2, 4.6, 4.6.1 on Windows Embedded 8 Standard and
Windows Server 2012 (KB4019110)
May 2017 Security Only Update for.NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2 on Windows 8.1 and Windows
Server 2012 R2 (KB4019111)
May 2017 Security and Quality Rollup for.NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 on Windows Embedded
Standard 7, Windows 7, and Windows Server 2008 R2 (KB4019112)
May 2017 Security and Quality Rollup for.NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2 on Windows Embedded 8
Standard and Windows Server 2012 (KB4019113)
May 2017 Security and Quality Rollup for.NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2 on Windows 8.1, Windows
RT 8.1, and Windows Server 2012 R2 (KB4019114)
May 2017 Security and Quality Rollup for.NET Framework 2.0 on Windows Server 2008 (KB4019115)
Security Update for Windows Server 2008 (KB4019149)
Security Update for Windows Server 2008 and Windows XP Embedded (KB4019204)
Security Update for WES09 and POSReady 2009 and Windows Server 2008 (KB4019206)
2017-05 Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2 (KB4019213)
2017-05 Security Only Quality Update for Windows Embedded 8 Standard and Windows Server 2012 (KB4019214)
2017-05 Security Monthly Quality Rollup for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2
(KB4019215)
2017-05 Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012 (KB4019216)
2017-05 Security Only Quality Update for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2
(KB4019263)
2017-05 Security Monthly Quality Rollup for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2
(KB4019264)
2017-05 Security Update for Adobe Flash Player for Windows 10, Windows 8.1, Windows RT 8.1, Windows Server
2012 R2, Windows Embedded 8 Standard, and Windows Server 2012 (KB4020821)

Non-Security Update List:

Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3173424)
Dynamic Update for Windows 10 Version 1703 (KB4020007)
Update for Windows 10 Version 1703 (KB4020008)
Update for Windows Server 2008 and Windows XP Embedded (KB4020535)
Windows Malicious Software Removal Tool – May 2017 (KB890830)

Adobe Patches:

Adobe has released small updates consist of 2 updates. The Critical Updates for flash fixes 7 CVEs (CVE-2017-3068, CVE-2017- 3069, CVE-2017-3070, CVE-2017-3071, CVE-2017-3072, CVE-2017-3073, CVE-2017-3074 ) and being listed as priority 1 and under active attack. It is highly recommended to fix all the updates as soon as possible. The other update Security updates for Adobe Experience Manager(AEM) and not being reported as under an active attack so far.

Intel Patches:

Recent few updates have been released from processor giant. There are two ways this vulnerability may be accessed.

1) An unprivileged network attacker could gain system privileges to provisioned Intel manageability.
2) An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability.

Critical severity rating CVE-2017-5689 allow an elevation of privilege vulnerability in AMT portion of the chipset. AMT provides managed client systems through the web interface, AMT is enabled in the BIOS but not provisioned. Neither remotely nor locally can be connected and nor the traffic ports 16992-16995 will be listening. And if you have enabled or using AMT then your system might be in a state of vulnerable.

Once configured, Intel AMT is a network service awaiting an authenticated and authorized request”. Traffic on ports 16992-16995 are directly intercepted by Intel AMT within the chipset before being passed to the host operating system… once Intel AMT is in a configured and accessible state.

Why Must Intel AMT Be Configured, and What is Required?

For more details visit here

Download Excel sheet: Security Update – MAY-2017

Intel Firmware Vulnerability

VulnerabilityIntel has released recommendations to address a vulnerability in the firmware of the following Intel products: Active Management Technology, Standard Manageability, and Small Business Technology firmware versions 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, 11.5, and 11.6. This vulnerability does not affect Intel-based consumer PCs. An attacker could exploit this vulnerability to take control of an affected system.

Users and administrators are encouraged to review Intel Security Advisory INTEL-SA-00075 and updated mitigations and tools:

Users and administrators are encouraged to review Vulnerability Note VU#491375 and the Intel links below and refer to their original equipment manufacturers (OEMs) for mitigation strategies and updated firmware.

Note :  INTEL-SA-00075 Detection Guide , Detection Tool , Intel mitigation document 

References: 

https://www.us-cert.gov/ncas/current-activity/2017/05/07/Intel-Firmware-Vulnerability

https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr

https://www.kb.cert.org/vuls/id/491375

 

Forgot Local Admin Password and Unable to login with Domain Account

Problem Statement: Suppose you have a Windows server, which is very critical and have loads of critical application running but unfortunately the server cannot able to communicate with Active Directory and you cannot able to login to the server with the domain account.

And here come the real fun, due to some rogue employee, he has set some non-standard administrator password you neither know about of it and he is no longer with your organization.

How to solve this issue?

Solution :

1) We require the Windows Server 2012 R2 boot disc (or an ISO file for the virtual environment). Select the language and click next.

2012 R2 Welcome.png

2) Click the option “Repair your computer“.

Repair Screen

3) Select Troubleshoot – > Advanced Options -> Command Prompt

Troubleshoot Screen

Troubleshoot CMD.png

 

4) We will now take backup of utility manager executable. At the command prompt enter command as:

move d:\windows\system32\utilman.exe d:\windows\system32\utilman.exe.bak      OR”

ren utilman.exe utilman.exe.bak

CMD-1

Note: Windows Installation is now located at D: drive so we would change current drive to D: instead of C:

5) Copy cmd.exe and rename to utilman.exe.

CMD-2

 

copy d:\windows\system32\cmd.exe d:\windows\system32\utilman.exe

6) Remove the boot media and reboot the server.

wpeutil reboot

7) Once the server is up and running click on the utility manager icon.

Go to CMD

8) The Command prompt will be opened and now we will give the below commands to reset the administrator password.

change password

net user administrator *

9) Once the password is reset close the command prompt and reboot the server. Now try to login with the new administrator password it should allow you to log into.

Admin Login Screen.png

10) Now we can troubleshoot why the server is not able to communicate to the domain controller and won’t allow accessing from domain account.

11) Once all set we should reset back the utilman.exe.we will again boot the server setup and follow steps 1-5 and then enter.

move /y d:\windows\system32\ utilman.exe.bak d:\windows\system32\ utilman.exe

12) Remove the boot media and reboot the server.

wpeutil reboot