Penetration testing

Learn more about the benefits of penetration testing. If you need help with security assessments or penetration testing, contact Core Security, www.coresecurity.com.

                In this quick tips and tricks video, you will learn how to launch a remote shell using WMI in Core Impact. Follow the steps in the video to learn how you can do this in your…

Read More

  It is our mission to continue to produce the most effective and efficient security products and services on the market. Today, I am happy to announce the release of Core Impact 18.1, our market leading penetration testing solution – where we put the…

Read More

Today we're sharing how to use the customizable reports functionality available in Core Impact. In order to generate such agents, we'll use the "Network Report Generation" wizard. From the list of available reports, filter for type "spreadsheet" and select "Network Host Report". When clicking on "Duplicate"…

Read More

The next set of features shown in this quick video demonstrates the PowerShell integration that's available on Windows agents. The first step is to use the "Get installed PowerShell version" in order to verify that the target system has the proper PowerShell environment ready to…

Read More

In this demo, you'll learn how to leverage the already installed PCAP-enabled agent from last week in order to establish a remote interface on the restricted internal network. After searching for the "Remote Network Interface" module, drop it under the agent. Then, select the interface on…

Read More

In this quick video, we show how the PCAP plugin can be installed and used in order to quickly and efficiently improve the speed of information gathering tasks. Since installing the PCAP plugin requires administrative privileges, we'll begin by running a local escalation module. For this…

Read More

  In this video, we show how to set up a temporal agent using the DNS communication channel. In order to mimic a client-side attack against a victim inside our restricted network, we'll use the "Server Agent in Web Server" module. After selecting the proper architecture,…

Read More

It’s the start of a new year. A time where it’s normal for businesses to look at what worked, what didn’t and what to start or stop. With those conversations happening, it’s just as important to discuss this from a security perspective. Looking back,…

Read More

We celebrate the holidays with shopping, gift giving and spending quality time with friends and family. However, when January rolls around and your employees are back in the office it’s likely that they will arrive with a shiny new toy or two. In the…

Read More

Here is the summary of all of the exploits and updates shipped to Impact 2017 R2 since Sept 26th (the last Dot release): 17 Updates overall 9 Remote Exploits 3 Client-Side Exploits 4 Local Exploits 1 Product update   Here is the list of the published modules: Remote Exploits: Trend Micro Mobile…

Read More