Toolbox for VulnDetect
-
About the Toolbox for VulnDetect
The Toolbox for VulnDetect is designed to make the usage of VulnDetect easier.
It provides you many features like:- get detailed information about other applications (this information can be posted in the forums)
- manually start a VulnDetect system scan for installed applications
- open the folder containing the VulnDetect log files (in the forums the VulnDetect support may ask for these files)
- view the VulnDetect log files directly in the Toolbox for VulnDetect
- check-in to the VulnDetect Servers to check if there are pending tasks (like installations of available updates)
- open various VulnDetect websites (like the List of Applications or the Forums)
A detailed help and also the Version History are available in the Toolbox.
This includes also a list of missing features.
Screenshots of the Toolbox
Here you see a screenshot of the Toolbox for VulnDetect (Tab "VulnDetect Tools"):
Here you see a screenshot of the tab "Get Application Details":
Downloading the Toolbox
The Toolbox is available as 32-Bit version and also as 64-Bit version:
- 32-Bit Version: Toolbox for VulnDetect.exe
- 64-Bit Version: Toolbox for VulnDetect x64.exe
Just download the Toolbox and execute it.
There is no installation necessary nor will there be any changes made to your system.
Feedback for the Toolbox
Your feedback for the Toolbox for VulnDetect is very welcomed, just post it here in this forums thread.
A list of missing features that are planned for future versions is available in the Toolbox (Tab "About"). -
@OLLI_S Lots of good ideas.
The first one, that about excluding drives or folders, is getting a lot closer. I don't have a date yet, but we will soon make the final decision about how it should be implemented in the backend and then it shouldn't be long before there will be a UI component for it too. -
-
I thought about the Future of the Toolbox.
Maybe I remove the buttons Start Full System Scan and also Check-In to VulnDetect Servers.
Or maybe I remove the complete first page in the Toolbox.The next issue is the Ignored Paths.
Currently there is no UI where users can see the ignored paths and edit them.
See [Work in progress] Exclude specific drives/folders from scanIn that topic a guy called @Tom wrote at 31 Jan 2019, 17:57:
And in the long run, this will be done via the UI. Only technically savvy users should play with this in the registry or on the command line.
Hey, that was 3 Years, 9 Months and 12 Days ago.
And we still have no UI, where users can enter the ignored paths.
I think it does not make any sense to code this in the Toolbox, right?So, what is your feedback @Tom and @GregAlexandre
You both seem to be the only active users (together with me) of the toolbox.@Tom I have a new idea:
What about a web-dialog, where users drag an exe file to and the dialog performs the same things, as the toolbox (extracts the version info and also the icon)? -
@Tom : Thanks.
But I explained that the "inspect" button now does the same thing. So no worry, for us, if the --immediate disappear.
We used the toolbox to send you a new app.
Regards. -
@GregAlexandre Interesting.
Luckily, I discussed this with a developer earlier today, and it seems that we can keep the
--immediate
though technically it will work quite differently.Instead of running an inspection, it will signal the service and ask it to run the inspection.
Only caveat is that it most likely will require Admin privileges to send this signal.
And then the process will exit immediately, while the service runs in the background.
The other options will still vanish because they will be incompatible with the new changes.
-
@Tom :
I use it to get apps details.
I use the beta version to get icon
In my family some were preferring the toolbox instead of the inspect button.
Greg. -
@OLLI_S Just wanted to officially inform about some upcoming and breaking changes to the agent.
Well, breaking for the Toolbox, but not for anything else, as far as we can tell.
With the upcoming major release of the agent, it will no longer be possible to run the
--immediate
in the same as way as before.The reason is simple: It doesn't make sense, because the inspection data returned by the agent are wrong, because the agent runs in the wrong context.
Instead, the
--immediate
will be changed to send a request for a new inspection task to the backend. Within 1 minute, the agent (the service) should pick up the task and inspect.This also means that the following options will be removed from the agent:
--no-filesystem --no-registry --no-system --no-msi --no-winupdate --ignore --path
The "ignore" and "path" can still be controlled via the registry:
https://vulndetect.org/topic/2388/I don't know how many users use the Toolbox, we use it, because it is a nice way to extract data for new detections, which in turn is posted to some internal sub-categories for documentation purposes.
But the functionality to inspect is not used by anyone at SecTeer.
-
@OLLI_S ; May I suggest that you release your version even if not perfect.
Agile way of life.
You have to get a valid pair of key to sign code*. Then you use the private key to sign your code. The way you do it is depending of you compiler. I know to do it for macros. And more than 10 years ago I knew how to do it with Visual Studio (was it Studio ?). Quite sure you will find this very quickly in help of your compiler.- you can get needed keys at Cacert if you are assured by some assurers. Only recognize if you trust Cacert root but free and better than nothing.
-
@GregAlexandre said in Toolbox for VulnDetect:
@OLLI_S : It seems that you did not updated the site with your latest toolbox?
Still in beta?
Will you sign your .exe ?It is still in Beta because I need to implement some features (smaller changes).
And I am waiting for a new version of Quick Any2Ico that detects the original size of the icon in the EXE file (contacted the developer but no reply yet).
I have no idea what is needed to sign an application (stopped programming 10 years ago and started it again for the Toolbox).
-
@OLLI_S : It seems that you did not updated the site with your latest toolbox?
Still in beta?
Will you sign your .exe ? -
@GregAlexandre :
To extract icons I now use Quick Any2Ico : https://www.carifred.com/quick_any2ico/
Regards. -
@Tom I removed free and portable IcoFx as it is vulnerable.
Next time I will use NirSoft IconsExtract even if I do not like using unsupported / inactive oldies project as no one but hackers know their security status.
Regards. -
@GregAlexandre
VulnDetect detects both NirSoft IconsExtract and IcoFX.
Remember, it is only the older (portable) versions of IcoFX that are vulnerable, if you install the latest, then there is no issues.
If you find another tool, then let me know and we will add detection for that. -
@OLLI_S Free IcoFx is vulnerable. Any suggestion in order to be able to help Tom with icons ?
-
@OLLI_S The more recent, that is what I did. I am sending Tom required icons
Thanks a lot for you help! -
Personally I would suggest to use IcoFX.
-
@OLLI_S Yes, this helps.
I now remember why I did not download these tools: their last version is very old! So one can think that these projects have no more support. This does not sound good for security.
Regards. -
@GregAlexandre said in Toolbox for VulnDetect:
Yes, a way to extract the icon from an exe file. Even if you redirect to another tool.
I already posted this topic many months ago:
https://vulndetect.org/topic/155/please-read-before-posting-new-detection-issuesDoes this help you?
-
@OLLI_S
Yes, a way to extract the icon from an exe file. Even if you redirect to another tool.
Regards.