Windows Exploit Suggester NG (WES-NG) is a tool based on the output of Windows’ systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to, including any exploits for these vulnerabilities.
Let’s get started with some prerequisites:
PS C:\> chocco.exe install python PS C:\> c:\>python39\python.exe -m pip install --upgrade pip PS C:\> pip3 install chardet mechanicalsoup
Once all prerequisites have been installed we are ready to execute our vulnerability test. In this example we are running wesng tool against just updated Windows 10 (as of 31-03-2021):
Edition Windows 10 Pro
OS build 19042.906
Experience Windows Feature Experience Pack 120.2212.551.0
Download the toll from github or clone it (I store it on a C:\ drive):
PS C:\> git clone https://github.com/bitsadmin/wesng.git PS C:\> cd c:\wesng-master ## Run system info and sent output to systeminfo.txt file PS C:\esng-master> systeminfo > systeminfo.txt
Download the latest database of vulnerabilities by executing wes.py with –update flag
PS C:\esng-master> python wes.py --update Windows Exploit Suggester 0.98 ( https://github.com/bitsadmin/wesng/ ) [+] Updating definitions [+] Obtained definitions created at 20210327
Eventually run the WES-NG script:
We are using –muc-lookup parameter to validate identified missing patches against Microsoft’s Update Catalog, which requires mechanicalsoup package to be installed.
PS C:\wesng-master> python wes.py --muc-lookup systeminfo.txt Windows Exploit Suggester 0.98 ( https://github.com/bitsadmin/wesng/ ) [+] Parsing systeminfo output [+] Operating System - Name: Windows 10 Version 20H2 for x64-based Systems - Generation: 10 - Build: 19042 - Version: 20H2 [+] Loading definitions - Creation date of definitions: 20210327 [+] Determining missing patches [+] Looking up superseeding hotfixes in the Microsoft Update Catalog - Looking up potentially missing KB4601050 [..........] found: [KB4601554] - Looking up potentially missing KB5000802 [................] found: [KB5001567, KB5001649, KB5000842] [-] No vulnerabilities found
No vulnerabilities found! Well, I’m lucky today.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.