In addition to exploitation capabilities, Core Impact also includes powerful attack and penetration techniques that can be used to collect passwords to use later on in engagements. This training video covers a few ways to conduct password attacks using Core Impact.