SecTeer VulnDetect Support Forum

    VulnDetect

    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Download VulnDetect Installer
    1. Home
    2. rnz
    • Profile
    • Following 0
    • Followers 0
    • Topics 10
    • Posts 10
    • Best 1
    • Controversial 0
    • Groups 0

    rnz

    @rnz

    3
    Reputation
    10
    Profile views
    10
    Posts
    0
    Followers
    0
    Following
    Joined Last Online

    rnz Unfollow Follow

    Best posts made by rnz

    • TightVNC - Install, Upgrade

      TightVNC can be upgraded using the Custom Software feature in VulnDetect - Corporate:
      https://corporate.vulndetect.com/#/deployment/custom-create-job

      Download the latest installers from the official website:
      https://www.tightvnc.com/download.html

      The parameters used in this guide are present in TightVNC's official documentation:
      https://www.tightvnc.com/doc/win/TightVNC_2.7_for_Windows_Installing_from_MSI_Packages.pdf

      To install TightVNC with its default settings use /quiet /norestart, this will install (or upgrade) both Viewer and Server.
      9c9b8115-b03a-4ae3-8c78-38211ef24a76-image.png

      If you would like to install a specific component of TightVNC, use the standard MSI property
      named ADDLOCAL. The following three commands install only the server part, only the client part
      and both parts, correspondingly:

      • msiexec /i tightvnc-2.8.63-gpl-setup-64bit.msi /quiet /norestart ADDLOCAL=Server
      • msiexec /i tightvnc-2.8.63-gpl-setup-64bit.msi /quiet /norestart ADDLOCAL=Viewer
      • msiexec /i tightvnc-2.8.63-gpl-setup-64bit.msi /quiet /norestart ADDLOCAL="Server,Viewer"
      

      Note that running the installer with e.g., ADDLOCAL=Server, on a system with both Viewer and Server, will remove the Viewer.

      a3d8960c-84c0-4125-96f8-a009be5ba7e1-image.png
      TightVNC with the Server component only.

      aebcbe91-167a-4de8-8440-6b0608266cfe-image.png

      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz

    Latest posts made by rnz

    • Snagit Uninstaller Tool (manage old annual releases)

      You can use the Snagit Uninstaller Tool with Custom Software in order uninstall specific or all versions of Snagit.
      Please read the official documentation here:
      https://support.techsmith.com/hc/en-us/articles/360022581532-Snagit-Windows-Use-the-UninstallerTool-exe-as-Command-Line-Tool

      • Start by creating your new Custom Software here:
        https://corporate.vulndetect.com/#/deployment/custom-create-job
        e74c27fe-1512-4a06-bfba-fd67fc99ff0b-image.png
        The arguments used will keep the 2023 version and uninstall all the previous yearly releases.

      Parameters

      • -product <insert product_name> - Remove all versions of Snagit.
      UninstallerTool.exe -product snagit
      
      • -keep <insert comma-separated version list> - Remove all versions of Snagit except specific versions.
      UninstallerTool.exe -product snagit -keep 23,22
      
      • -remove <insert comma-separated version list> - Remove only specific versions of Snagit.
      UninstallerTool.exe -product snagit -remove 20,21
      
      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz
    • Palo Alto Networks GlobalProtect - Install, Upgrade

      The installer(s) of GlobalProtect are not publicly available for download. You will need to acquire them through the GlobalProtect portal as stated in the official documentation from the vendor's website.

      You can read the full article here:
      https://docs.paloaltonetworks.com/globalprotect/6-1/globalprotect-app-user-guide/globalprotect-app-for-windows/download-and-install-the-globalprotect-app-for-windows

      Once you have acquired the installer, you can upload it to VulnDetect using the Custom Software feature, use the documented silent parameters and run the inspection on the Hosts you have deployed the Custom Software job.

      dde41921-6b5d-4b45-9a2b-fa8473de8ba9-image.png

      Additionally, the installer can be configured with the following arguments:

      • configure the portal address
      /quiet /norestart PORTAL=”portal.acme.com”
      
      • prevent users from connecting to the portal if the certificate is not valid
      /quiet /norestart CANCONTINUEIFPORTALCERTINVALID=”no”
      
      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz
    • CodeMeter Runtime - Install, Upgrade

      CodeMeter Runtime can be deployed/updated using the Custom Software feature in VulnDetect - Corporate:

      You can download official installers from here:
      https://www.wibu.com/us/support/developer/downloads-developer-software.html
      We have used the CodeMeter Runtime Kit for Distribution x64 MSI installer for our tests.
      89fae09c-1bf5-443b-94c2-49a6d3cd3af5-image.png
      Upload the MSI and insert the following silent arguments: /qn /norestart
      3891412e-3779-45d0-9dec-28f55e3f5739-image.png
      You are now ready to deploy or upgrade CodeMeter Runtime.

      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz
    • OpenVPN - Install, Upgrade

      OpenVPN can be deployed/updated using the Custom Software feature in VulnDetect - Corporate:

      Note: Updating has worked on our internal systems without an active VPN configuration. We expect that the update will kill active VPN connections.

      You can download official installers from here:
      https://openvpn.net/community-downloads/

      Upload the installer and insert the following silent arguments: /qn /norestart
      11dc8056-35a5-4beb-ae73-d528008ae37a-image.png
      You are now ready to deploy or upgrade OpenVPN.

      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz
    • AnyConnect - Install, Upgrade

      AnyConnect can be deployed/updated using the Custom Software feature in VulnDetect - Corporate:

      Note: Updating has worked on our internal systems without an active VPN configuration. We expect that the update will kill active VPN connections.

      You can download official installers from here:
      https://www.cisco.com/c/en/us/support/security/anyconnect-secure-mobility-client-v4-x/model.html#~tab-downloads

      Upload the installer and insert the following silent arguments: /qn /norestart
      9f59a526-1f4f-4b91-a139-560f45a0e322-image.png
      You are now ready to deploy or upgrade AnyConnect.

      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz
    • WorkPoint Express - Install

      (Updating should also work, but we can't test this, as we don't have a license for the software)

      In order to create a custom deployment for WorkPoint Express, please navigate to:
      https://corporate.vulndetect.com/#/deployment/custom-create-job

      • Enter a title e.g. "WorkPoint Express 6"
      • Select the installer: WorkPoint Express x64 6.2.1.3 Setup.msi
      • Enter the silent Argument: /qn
      • Enter the never restart option Argument: /norestart

      For more information about relevant (and required arguments) see:
      https://support.workpoint.dk/hc/en-us/articles/206486658-WorkPoint-Express-Scripted-Installation-use-this-for-installing-journalize-flag-

      3af71e07-5abe-4c7e-9673-bad32a5768cf-image.png
      And then click "Save".
      The dialogue will now upload the files to the VulnDetect back-end.

      After saving the Job, you can now select to deploy it to groups or hosts.
      Remember to inspect the host or group, if you want the job to run right away, else it'll apply after the next scheduled
      inspection.
      After the Job is "Completed" on a host, VulnDetect will automatically conduct a new inspection and update the results for
      each host:
      https://corporate.vulndetect.com/#/deployment/activity
      And you should be able to find the updated results on the hosts or applications page moments later.
      098dd201-6b9a-40e6-ad24-baf59e81019d-image.png

      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz
    • SeaMonkey - Install, Upgrade

      SeaMonkey can be upgraded using the Custom Software feature in VulnDetect - Corporate:

      Note: Upgrading will require the same language installer to be applied to the existing installation in order for the process to be silent.

      You can download official installers from here:
      https://www.seamonkey-project.org/releases/
      Make sure to select the right architecture: Windows x64/Windows x86

      Upload the installer and insert the following silent arguments: /VERYSILENT /NORESTART /S /quiet
      56907691-ca8e-42d5-b697-e870bfbd5a8b-image.png
      After uploading the file, you need to select the groups or hosts to which you wish to deploy the package / updates.

      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz
    • TightVNC - Install, Upgrade

      TightVNC can be upgraded using the Custom Software feature in VulnDetect - Corporate:
      https://corporate.vulndetect.com/#/deployment/custom-create-job

      Download the latest installers from the official website:
      https://www.tightvnc.com/download.html

      The parameters used in this guide are present in TightVNC's official documentation:
      https://www.tightvnc.com/doc/win/TightVNC_2.7_for_Windows_Installing_from_MSI_Packages.pdf

      To install TightVNC with its default settings use /quiet /norestart, this will install (or upgrade) both Viewer and Server.
      9c9b8115-b03a-4ae3-8c78-38211ef24a76-image.png

      If you would like to install a specific component of TightVNC, use the standard MSI property
      named ADDLOCAL. The following three commands install only the server part, only the client part
      and both parts, correspondingly:

      • msiexec /i tightvnc-2.8.63-gpl-setup-64bit.msi /quiet /norestart ADDLOCAL=Server
      • msiexec /i tightvnc-2.8.63-gpl-setup-64bit.msi /quiet /norestart ADDLOCAL=Viewer
      • msiexec /i tightvnc-2.8.63-gpl-setup-64bit.msi /quiet /norestart ADDLOCAL="Server,Viewer"
      

      Note that running the installer with e.g., ADDLOCAL=Server, on a system with both Viewer and Server, will remove the Viewer.

      a3d8960c-84c0-4125-96f8-a009be5ba7e1-image.png
      TightVNC with the Server component only.

      aebcbe91-167a-4de8-8440-6b0608266cfe-image.png

      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz
    • Cisco Jabber - Install, Upgrade

      This guide is meant as a supplement to cover the channels of Cisco Jabber where the installer isn't publicly available, but still are supported.

      Jabber installers starting with 14.0.5 and 14.1.2 are no longer made public by Cisco. Customers with an active contract from Cisco are able to acquire any installer from the following page:

      https://www.cisco.com/c/en/us/support/unified-communications/jabber-windows/series.html#~tab-downloads

      0c57a7ce-4ea5-40db-9c94-0c8bf78d0621-image.png

      Once the installer is downloaded you just need to upload it and add the usual /qn /norestart parameters to make the MSI silent.
      6dd69387-2cb9-4b52-8c69-7c1146e817a4-image.png

      You are now ready to deploy or upgrade Cisco Jabber.

      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz
    • Zoom - Uninstall with the Clean Zoom Uninstaller

      Zoom has published a tool to help tidying unwanted Zoom installations.

      You can download the Zoom Uninstaller from here:
      https://stream.vulndetect.com/e/CleanZoom.exe

      The following switches are available when running the installer:

      MSI option | Description

      • /silent - Removes Zoom silently.
      • /keep_outlook_plugin - Removes Zoom, but leaves the Outlook Plugin installed.
      • /keep_lync_plugin - Removes Zoom, but leaves the Lync/Skype for Business Plugin installed.
      • /keep_notes_plugin - Removes Zoom, but leaves the Notes Plugin installed.
      • /vdi_clean - Removes the VDI package.

      Note: Use of the clean uninstaller will completely remove the Zoom client, as well as the Zoom plugin for Outlook. The Outlook add-in, Chrome/Firefox extensions, and the GSuite add-on are unaffected.

      • Enter a title e.g. "Zoom Uninstall"

      • Select the uninstall executable: CleanZoom.exe

      • Enter the silent Argument: /silent

      Optionally configure the uninstall using the parameters mentioned above:

      • Enter Installer Arguments: /silent /keep_outlook_plugin"

      And then click "Save".

      487464e2-bb15-480f-a543-4663009313f1-image.png
      The dialogue will now upload the files to the VulnDetect backend.

      After saving the Job, you can now select to deploy it to groups or hosts.

      Remember to inspect the host or group, if you want the job to run right away, else it'll apply after the next scheduled inspection.

      After the Job is "Completed" on a host, VulnDetect will automatically conduct a new inspection and update the results for each host:
      https://corporate.vulndetect.com/#/deployment/activity

      And you should be able to find the updated results on the hosts or applications page moments later.
      b1c23582-a87b-4651-b9bc-5befe64e478b-image.png

      posted in [Corporate] Deployment -> Custom Software
      rnz
      rnz