Latest from CoreLabs

Read blog posts from CoreLabs, the research division of Core Security. CoreLabs prides itself on taking a holistic view of information security with a focus on developing solutions to complex, real-world security problems that affect our customers.

It’s not unusual to find firewall devices during a security assessment, which can make life harder for penetration testers. Modern firewall devices (Next Generation Firewalls aka NGFWs) are a far cry from simple traffic control systems. A NGFW is an integrated network platform…

Read More

On January 27, 2015, Qualys publicly released a security advisory in glibc’s gethostbyname set of functions, also known as GHOST, which exposes a heap-based buffer overflow affecting a wide range of operating systems and applications using glibc between versions 2.2 and 2.18. CVE-2015-0235…

Read More

At the end of January, Adobe published the security bulletin APSA15-01 for Flash Player, which fixes a critical use-after-free vulnerability affecting Adobe Flash Player 16.0.0.287 and earlier versions. This vulnerability, identified as CVE-2015-0311, allows attackers to execute arbitrary code on vulnerable machines by enticing…

Read More

Occasionally we receive requests to develop Core Impact modules for specific vulnerabilities. Here, I'd like to dive into what that process looked like for CVE-2013-3200, Windows USB vulnerability included in MS13-081 bulletin a.k.a. Windows USB Descriptor Vulnerability. The vulnerability allows physically proximate attackers…

Read More

A great penetration tester always remembers to take physical security into account. With that in mind, we've added an interesting new feature to Core Impact Pro. The module, called “install Agent using Teensy board,” allows Core Impact Pro users to deliver a physical…

Read More

A few weeks ago a critical vulnerability (MS14-068) affecting Windows environments was published by Microsoft (credited to Tom Maddock and team). Specifically, the vulnerability affects Kerberos: [The vulnerability will] allow an attacker to elevate unprivileged domain user account privileges to those of the domain…

Read More

We've released an update to Core Impact Pro that adds a small (but interesting) new feature to one of our most popular modules. Users now have the ability to generate agent payloads that can be customized to specific targets by third party frameworks.…

Read More

We can’t agree on a name, but we can agree it’s a big deal. What is this thing?Many are saying this vulnerability could be bigger than Heartbleed. From my perspective, Heartbleed was a bit more troubling due to the affected component and the massive…

Read More

I've been thinking about the problems that occur when a new vulnerability appears, and how vendors and users react in these situations. In cases where a vulnerability is found in a specific program, the vendor is responsible for finding a fix and distributing the patched…

Read More

We've released a new vulnerability advisory. For those who aren’t familiar with Core Security’s advisories, this research is conducted by CoreLabs in an effort to expose security gaps before adversaries find them. Upon discovering a vulnerability, we work with the affected organization and…

Read More