Getting Started with Core Impact | Using Modules
In this video, you'll learn how to take more direct control of your pen testing using the modules function in Core Impact.
The Attack and Penetration RPT is an automated option for when you want the system to makes choices on your behalf. If you want to take a more hands-on approach to pen testing, you can instead navigate to the modules tab and individually select each module and target them for specific boxes or times.
For instance, if you know that a particular exploit pops a particular box. Or, if you've found a KRBTGT file to leverage in the research face, you'd perhaps want to use the Golden Ticket module.
The Module Information Display
The Module Parameters box displays module output, log, and parameters. Once you run a module, you can toggle between the three to obtain detailed logs on everything the module did, whether or not it was successful, and the parameters under which the module ran.
Executed Modules
This windows displays all the modules executed during the current instance of the workspace. Some modules like a persistent agent or Windows Secret Dump allow you to stop and relaunch. If stopped, it will display in the status column of the window.