Cyber Security Awareness and Vulnerabilities Blog
Image
Core Impact and Cobalt Strike: Distinct Strengths, Enhanced Combination
Given its functionality as a multifaceted toolset, there are some features of Core Impact that users may not have taken advantage of. In this post, we’ll talk about SOCKS tunneling.
Image
Core Impact Monthly Chronicle: Exploits and Updates | November 2024
Core Impact Exploit Library Additions
Image
Core Impact Monthly Chronicle: Exploits and Updates | October 2024
Core Impact Updates NTMLrelayx MultiRelay and Keep-Relaying Support The latest update to Impacket 0.12 introduces the MultiRelay and keep-relaying modes, allowing users to run relays for extended periods and analyze captured connections for each target. The NTLMrelayx module will continuously relay new incoming connections until manually stopped.
Image
How to Proactively Harden Your Environment Against Compromised Credentials
According to NordPass, the average user maintains an average of 168 logins for personal purposes, and no less than 87 for the workplace. This is an extraordinary amount to keep safe, and threat actors realize that it’s only a matter of time before users make a wrong move and enter those credentials somewhere they’re not supposed to. And this is why, inevitably, they manage to swipe them and sneak into an undisclosed network.
Image
Core Impact Monthly Chronicle: Exploits and Updates | August & September 2024
Core Impact Exploit Library AdditionsOne of Core Impact’s most valuable features is its certified exploit library. Fortra’s Core Security has a team of expert exploit writers that conduct research, evaluating and prioritizing the most relevant vulnerabilities in order to update the library with critical and useful exploits.
Image
Are You Prepared for Ransomware IRL?
Most ransomware prevention advice focuses on antivirus software and other defenses, such as having good detection and response (DR) mechanisms. All of these are important. But with the advanced level of ransomware today, you also need to take measures that test your defenses and DR strategies to ensure the measures you have in place will hold up to a real-life advanced attack.
Image
Core Impact 21.6: Take Control with the Connection Store
Core Impact 21.6 is now available. This release sees the introduction of the Connection Store, new reporting features, a newer UI for the entities Quick Information panel, a series of quality-of-life changes and more.
Image
Core Impact Monthly Chronicle: Exploits and Updates | July 2024
Core Impact Exploit Library AdditionsOne of Core Impact’s most valuable features is its certified exploit library. Fortra’s Core Security has a team of expert exploit writers that conduct research, evaluating and prioritizing the most relevant vulnerabilities in order to update the library with critical and useful exploits.
Image
3 Components of a Proactive Security Strategy
Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:
Image
Core Impact Monthly Chronicle: Exploits and Updates | June 2024
Core Impact Exploit Library AdditionsOne of Core Impact’s most valuable features is its certified exploit library. Fortra’s Core Security has a team of expert exploit writers that conduct research, evaluating and prioritizing the most relevant vulnerabilities in order to update the library with critical and useful exploits.
Image
CISO Commentary: The Art of Patching
Recently, Core Security released the 2024 Penetration Testing Report, which shares the results from an annual survey of cybersecurity professionals on their experiences with offensive security strategies and solutions.
Image
CISO Commentary: Budgeting for Offensive Security
Recently, Core Security released the 2024 Penetration Testing Report, which shares the results from an annual survey of cybersecurity professionals on their experiences with offensive security strategies and solutions.
Image
Pen Testing Across the Environment: External, Internal, and Wireless Assessments
Do you know the difference between internal pen tests, external pen tests, and wireless pen tests? It matters.
Image
CISO Commentary: How Often Should You Pen Test?
Recently, Core Security released the 2024 Penetration Testing Report, which shares the results from an annual survey of cybersecurity professionals on their experiences with offensive security strategies and solutions.
Image
Core Impact Monthly Chronicle: Exploits and Updates | May 2024
Core Impact UpdatesNew UI and Usability Improvements for Reports The Core Impact Reports have been modernized, with data reviewed to improve its actionability and user friendliness.
Image
Weighing the Risk: The Cost of Skipping Pen Tests
Cybersecurity budgets are beginning to get cut across the country, and organizations are faced with tough choices about what should stay and what should go. As security budgets face extra scrutiny and potential cuts, it’s critical to evaluate the cost and benefits of each security practice. It can be difficult to define the value of proactive security solutions like pen testing, as a precise ROI is hard to determine. After all, how does one quantify attacks that were prevented?
Image
Core Impact Monthly Chronicle: Exploits and Updates | April 2024
Core Impact UpdatesSMB NTLM Information Dumper This module improves the reconnaissance step for Active Directory testing, specifically gathering NTLM information using SMB/RPC protocols to prepare NTLMrelayx Man-in-the-middle attacks. Among other information, it retrieves:
Image
Open Source vs. Enterprise: Why Not All Exploits are Created Equal
A common tactic of attackers trying to breach an environment is to use an exploit against a known vulnerability in an application or device present in a targeted infrastructure. Exploiting a vulnerability can provide an attacker with privileges or capabilities they would not normally be granted.
Image
Core Impact Monthly Chronicle: Exploits and Updates | March 2024
There are no blogs that meet your search criteria.
Image
Advantages of Offensive Security Vendor Consolidation
We sat down with John Stahmann, CISSP and Director of Sales Engineering for Offensive Security and Infrastructure Protection at Fortra, and asked him what he had learned after more than 20 years in the industry about the pitfalls, hacks, and little-known facts of offensive security.
Image
Core Impact Monthly Chronicle: Exploits and Updates | Feb 2024
Core Impact UpdatesDuring the month of February, updates have been made to Core Impact to enhance its functionality. New modules have been added to perform Active Directory attacks taking advantage of new features from the latest version of Impacket.
Image
Why Relay Attacks Are Still Common and How to Prevent Them
NTLM (NT Lan Manager) relay attacks are still a significant threat to the security of Windows based networks. Though it is a well-known attack method that has been around for many years, it is no less dangerous than when it first emerged. In fact, it has been an attack method that is currently popular with “aggressive” hacking groups, including the Russian APT28. These groups have successfully used relay attacks to target multiple high-value targets worldwide.
Image
What is the Role of Purple teaming and Why is it Important?
When hashing out your offensive security strategy, it’s not all about winning – especially when you’re role-playing as the hacker.
Image
Core Impact Monthly Chronicle: Exploits and Updates | Jan 2024
One of Core Impact’s most valuable features is its certified exploit library. Fortra’s Core Security has a team of expert exploit writers that conduct research, evaluating and prioritizing the most relevant vulnerabilities in order to update the library with critical and useful exploits. Additionally, the QA team creates its own clean environment to validate each exploit before its release to ensure our standards and validate that it is safe and ready to use.
Image
Cybersecurity and the Law: Taking Proactive Steps Before Needing Legal Action
How the justice system deals with cybercrime is still relatively new and finding its footing. How cybercriminals are leveraging the legal system is relatively new, too.