Exploits for code execution vulnerabilities are generally designed to deliver payloads on compromised systems. In CORE Security solutions, these exploit payloads are called "agents."
An exploit's ability to successfully deploy and connect to an agent provides indisputable evidence that a vulnerability exists, thereby eliminating false positives and allowing you to perform penetration tests with 100% confidence.
How Agents Work
Exploits for code execution vulnerabilities typically execute a command shell (shellcode) on the target system and allow you to communicate with the shell via a network connection (e.g., binding the shell to a port or connecting back from the target to the attacking host). CORE Security’s patented agents also allow you to interact with compromised systems via command shells, while providing additional capabilities that ensure safe and reliable testing.
Agents and CORE Security Solutions
CORE Security agents help to ensure that your penetration tests are safe, accurate and efficient through a number of key capabilities:
- A minimal footprint for safe penetration testing
CORE Security solutions deploy agents into the memory of targeted systems, ensuring that your penetration tests are minimally invasive and safe for compromised systems. Agent code is typically smaller than most emails, and no additional application code needs to be deployed on the compromised system.
- A powerful interface to compromised systems
An agent provides an interface to the compromised system, allowing you to gather additional information, escalate access privileges or attempt to compromise other network resources. The interface is easy to use, providing common access across all target platforms and eliminating the need to write different scripts for each platform. In addition, CORE Security’s patented agent technology allows you to run a command shell on any compromised system, even if the system does not have an accessible shell.
- Easy access to system calls and APIs
CORE Security’s unique Syscall Proxying technology enables you to leverage agents to access any system call or Windows API on a compromised system.
- Support for binary plug-ins and code
CORE Security solutions complement Syscall Proxying with additional functionality to support binary plug-ins and to execute arbitrary binary code on the target system, such as payloads dynamically created in runtime or as part of a customized exploit.
- Multiple connection methods
CORE Security solutions support multiple connection methods, including connect to target, connect from target, reuse connection and HTTP/HTTPS tunneling. Agents can also be chained together to reach network resources with limited connectivity.
- Agent Auto-Injection
You can maintain contact with a targeted workstation, even if compromised client software is restarted. Upon gaining workstation access, our solutions inject an agent into a new process outside of the compromised software. You can therefore continue to gather information about the workstation and pivot attacks to other systems without interruption.
- Simple clean-up
Unless instructed otherwise, CORE Security agents automatically uninstall themselves from memory upon termination of the communication channel, leaving no trace of the penetration test.