Cyber Security Awareness and Vulnerabilities Blog

RSS

In our last installment, I gave you a final hunk of code with several function calls and decided to let you stew for a week before revealing what was going on under the hood. Well, you’ve stewed for a week, so let’s review. while…

Read More

Learn how to detect, deter and remediate a breach before your data is compromised with our short video. 

Read More

Last week, we discussed exactly what we’ll be building and got some of the boilerplate done along the way. I’m sure that you dug into the modules that I strongly hinted that you take a look at for inspiration. To review, this module will need…

Read More

Welcome to our last chapter in our "Actionable Insight" eBook. If you've missed other chapters, go back and read them here.  Throughout this book, we have talked a lot about the problems facing cyber-security today and how we can combat them. However, the fact…

Read More

Last week I showed you how to set up your development environment for working with building your own modules for Core Impact and walked through building a classic “Hello World” style first module. In this installment, we’ll start diving into the anatomy of an…

Read More

It’s the most wonderful time of the year and if you’re like me, you’re already counting down the days until Christmas. It’s a time to be with friends and family with the added bonus of unwrapping those gifts under your tree. What most…

Read More

Have you ever openly mused to yourself, “I wish that Impact could _________?” What if I told you that it’s actually pretty straight-forward to build new functionality into Core Impact? Oh, so now you’re interested? Awesome. Over the next couple of blogs, I’m…

Read More

Did you know that, on average, 15 million residents in the U.S. are affected by identity theft and upwards of $50 billion are stolen1 each year? During the holiday season we hear a lot about keeping your identity safe when shopping online or in…

Read More

We’re releasing the new version of Core Impact shortly, with some exciting new features. I can’t speak for anyone but myself but the single most exciting new feature in Impact 2017 is our new ability to launch Powershell natively on target systems. PowerShell…

Read More

  I started this research trying to simplify the techniques used during a WIFI pen-test. The idea was to play with WIWO,  a tool released by Core Security last year, in order to make a transparent channel between a network interface located in my…

Read More