Our Blog

RSS

Last week, we discussed exactly what we’ll be building and got some of the boilerplate done along the way. I’m sure that you dug into the modules that I strongly hinted that you take a look at for inspiration. To review, this module will need…

Read More

Welcome to our last chapter in our "Actionable Insight" eBook. If you've missed other chapters, go back and read them here.  Throughout this book, we have talked a lot about the problems facing cyber-security today and how we can combat them. However, the fact…

Read More

Last week I showed you how to set up your development environment for working with building your own modules for Core Impact and walked through building a classic “Hello World” style first module. In this installment, we’ll start diving into the anatomy of an…

Read More

It’s the most wonderful time of the year and if you’re like me, you’re already counting down the days until Christmas. It’s a time to be with friends and family with the added bonus of unwrapping those gifts under your tree. What most…

Read More

Have you ever openly mused to yourself, “I wish that Impact could _________?” What if I told you that it’s actually pretty straight-forward to build new functionality into Core Impact? Oh, so now you’re interested? Awesome. Over the next couple of blogs, I’m…

Read More

Did you know that, on average, 15 million residents in the U.S. are affected by identity theft and upwards of $50 billion are stolen1 each year? During the holiday season we hear a lot about keeping your identity safe when shopping online or in…

Read More

We’re releasing the new version of Core Impact shortly, with some exciting new features. I can’t speak for anyone but myself but the single most exciting new feature in Impact 2017 is our new ability to launch Powershell natively on target systems. PowerShell…

Read More

  I started this research trying to simplify the techniques used during a WIFI pen-test. The idea was to play with WIWO,  a tool released by Core Security last year, in order to make a transparent channel between a network interface located in my…

Read More

It’s that time of year where retail booms as the world goes shopping for gifts during the holiday season. It’s the time for retailers to shine. It’s also the time where retailers are most vulnerable to security risks as bad actors gear up…

Read More

It’s that time of year where retail booms as the world goes shopping for gifts during the holiday season. It’s a time for retailers to shine. But, it’s also the time where retailers are most vulnerable to security risks as bad actors gear…

Read More