Penetration Testing for Network Devices

  • book demo
  • request trial

Core Impact® Pro is the first commercial-grade penetration testing software that can specifically target network devices and prove how a single intrusion could escalate into a widespread data breach.


Quickly Identify and Profile Network Devices in Your Environment

The Information Gathering step of Impact Pro’s Network Rapid Penetration Test (RPT) locates and profiles routers and switches found on your network. Alternately, you can identify targets via Impact’s Passive CDP network discovery module, which listens for broadcasts from Cisco devices. In either case, if Impact is able to discern the operating system of a target and confirm it to be a network device, it will attempt to gather additional information and present the device as a potential target for attack and penetration.

  • Identify and fingerprint devices to determine manufacturer, device model/type, and operating system details.
  • Determine the inputs on which the device accepts connections or instructions, including SNMP, Telnet, HTTP, etc.
  • Discover and test the security of broadcasting devices.


Replicate Real-World Attacks versus Routers and Switches

Unfortunately, network uptime is often prioritized over security. This is especially evident when devices are given simple passwords, or worse, left with default passwords. Impact Pro’s attack modules reveal exposed devices via dictionary attacks that attempt to guess usernames and passwords to gain access to the device – replicating a common technique employed by actual attackers.


Safely Demonstrate the Ramifications of Compromised Network Devices

If Core Impact Pro is able to gain access to a network device, it will deploy an IOS Agent* with which you can demonstrate risks to the network that occur subsequent to the initial compromise. Since making material changes to a switch or router’s configuration can seriously disrupt users and networks, Core Impact Pro can demonstrate a breach without interrupting a device’s operation via the following non-aggressive modules:

  • Get Configuration: This module attempts to retrieve the configuration file of the device and optionally try to crack any passwords that are in use.
  • Set Device Name: With this module, Impact Pro can rename the network device. This won't disrupt the operation of the device, but it can be an eye-opening display of its vulnerability to malicious attacks.
  • Interface Monitoring: This module takes advantage of a legitimate monitoring feature included in many switches, enabling the tester to demonstrate how attackers could intercept copies of data packets.
  • Access List Piercing: This module compromises a router’s network visibility filtering, allowing the Impact Pro user to access networks that were previously off-limits.

*The IOS Agent represents the steps of how to breach the device and does not install code on the target.


Use Core Impact Pro Reports as a Springboard to Remediation

As with all penetration testing vectors in Impact Pro, you can view the results of network device assessments in clear and actionable reports. Information about network device exposures is included in several Impact Pro reports, including:

  • Vulnerability Report: Provides specific details about all the weaknesses successfully exploited during penetration testing and how those flaws can be used by attackers to obtain control of a tested system and establish a beachhead for subsequent activity.
  • Activity Report: Presents a detailed log of all testing activity, including the relevant data that organizations might need to share with auditors reviewing their security programs.
  • Executive Report: Offers a high-level, aggregated view of penetration tests performed, an understanding of how ubiquitous vulnerabilities are, where they reside, how they can be exploited, and where to begin remediation efforts.

Next Steps

Book DemoRequest Trial