Skip to content

dobin/waasa

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Windows App Attack Surface Analyzer

It has three main features:

  • Display all file extensions and their associated programs from a windows machine
  • Test a content filter whitelist/blacklist against the file extensions
  • Give information about which file extensions are malicious

This can give a RedTeamer:

  • An overview of the attack surface of a machine
  • A list of files or ways the content filter can be bypassed

There is a online version:

Usage

Attack Surface

Waasa Attack Surface Windows

Content Filter Test

Waasa Content Filter Examine

Waasa Content Filter File

Usage Console (beta)

  • It uses ./waasa.json as default dump filename by default
  • You can copy waasa.json to another machine for analysis

Create a registry dump (to waasa.json):

> .\waasa.exe dump

Create CSV from dump:

> .\waasa.exe dump --csv output.csv

Create all files in ./output/:

> .\waasa.exe --files

Files

  • gathered_data.json: a dump from the registry of a machine and more, around 10MB
  • waasa.json: parsed registry dump (from gathered_data.json)
  • waasa.csv: Output to CSV
  • waasa.txt: Input of file extensions

Example Results

From a fresh Windows 10 VM with Visual Studio installed:

Notes about the results

Windows basically knows three types of actions when clicking a file:

  1. Execute the associated program
  2. Show "Open With" dialog, where a program is preselected (recommended)
  3. Show "Open With" dialog, no preselection or recommendation

Because of Windows restrictions, waasa will treat 1) and 2) mostly as the same. Which makes sense from an attackers perspective too, as users will likely click "Open With Recommended" entry.

The results are mostly based on Windows shlwap interface, which gives a lot of wrong results. I tried to improve the algorihmn, but there are still misidentifications possible. Double check your results (by manually clicking on the files).

OpenWith 1 Recommended

About

Windows Application Attack Surface Analyzer

Resources

License

Stars

Watchers

Forks

Packages

No packages published