Latest from CoreLabs

Read blog posts from CoreLabs, the research division of Core Security. CoreLabs prides itself on taking a holistic view of information security with a focus on developing solutions to complex, real-world security problems that affect our customers.

Hi everyone, I would like to make some comments about the Microsoft MS14-006 update. In the last February Patch Tuesday, Microsoft released a fix for the TCP Windows driver (tcpip.sys). According to the patch bulletin "https://technet.microsoft.com/en-us/security/bulletin/ms14-006" only Windows 8 and Windows 2012 were vulnerable. Diffing Windows 8,…

Read More

    In this blogpost I would like to introduce you to Sentinel, an anti-exploit tool, and share two demos with you. Sentinel is a 32-bit anti-exploit tool that I have been developing for some time which I presented in "Ekoparty" security conference at the…

Read More

November efforts were mainly focused on delivering new exploits and updates to existing exploits and modules requested by customers while working on the release of CORE Impact 2014 R1. The main exploits & modules released during November are listed below: Updates for November 2013 (excluding…

Read More

The following post, is a guest blog from Jonathan Lampe, from InfoSec Institute. The OWASP Top 10 list publicizes the most critical web application security flaws as determined by Open Web Application Security Project (OWASP), a nonprofit, vendor-independent IT security organization formed in 2001.…

Read More

My name is Nicolas Economou  and I’m a specialist member on the Exploit Writing Team here at CORE Labs - specializing in Windows kernel exploitation. Today, I would like to say a few words about a 0-day published a month ago. On Friday, May 17, 2013…

Read More

The OWASP (Open Web Application Security Project) is an open community dedicated to support the development and maintenance of secure Web Applications. The tools and documents offered by OWASP are very valuable for developers, QA folks, Security professionals, and anyone who takes Web…

Read More

MS13-017 - The harmless silent patch... Hi, in this blog post I'm going to discuss a silent patch published by Microsoft on 12th February 2013 (http://technet.microsoft.com/en-us/security/bulletin/ms13-017). Even though this bug was patched the previous patch Tuesday, I think that it is interesting to analyze…

Read More

By default, when attacking a mobile device in Core Impact Pro, we would use the Client-Side Rapid Penetration Test (RPT).  This method gives us the ability to generate, host, and send an email with a link to a malicious webpage or a malicious…

Read More

If you can't launch a brute force campaign, dictionary attacking is the way to go. Core Technical Specialist Dan Crowley offers some tips on throwing the book at something efficiently.

Read More