Getting Started with Core Impact | Using Modules

In this video, you'll learn how to take more direct control of your pen testing using the modules function in Core Impact.

 

 

 


 

The Attack and Penetration RPT is an automated option for when you want the system to makes choices on your behalf. If you want to take a more hands-on approach to pen testing, you can instead navigate to the modules tab and individually select each module and target them for specific boxes or times.

Image
network rpt modules

For instance, if you know that a particular exploit pops a particular box. Or, if you've found a KRBTGT file to leverage in the research face, you'd perhaps want to use the Golden Ticket module.

Image
core impact golden ticket module

 

The Module Information Display

The Module Parameters box displays module output, log, and parameters. Once you run a module, you can toggle between the three to obtain detailed logs on everything the module did, whether or not it was successful, and the parameters under which the module ran.

Image
core impact modules display

Executed Modules

This windows displays all the modules executed during the current instance of the workspace. Some modules like a persistent agent or Windows Secret Dump allow you to stop and relaunch. If stopped, it will display in the status column of the window.

Image
executed modules stopped