Resources

Article

Advanced Pen-Testing Tricks: Building a Lure to Collect High Value Credentials

Here’s the scenario: You’ve compromised a system but it hasn’t been logged into recently by an administrator, so you’re quite disappointed by your Mimikatz results. You’ve got local system credentials but nothing that’s on the domain except the machine account. Your mission: do something with the system that will attract the attention of someone with administrator credentials and make them log...
Article

How to Pen-Test Around the Password

What if I told you that in most networks these days, you don’t have to bother with cracking the passwords? With most networks with Active Directory, you can use the stored hash obtained via Mimikatz or a WPAD attack to authenticate. How, you may ask? It’s because of the wondrous bit of mis-engineering that is the Windows NT Login Challenge and Response. I’m going to dive into this a bit, so that...
Article

Identifying iDevices on your network using Core Impact, and where to go from there...

Oftentimes after using Network Information Gathering, we are still left with a number of devices that may reflect an "Unknown" OS. With the saturation of these devices in the market today, there is a good chance there may be some located on your network. By identifying these devices we can also potentially expand our attack surface and gain other useful information. So, where do we start? We may...
Article

Building Custom Modules for Core Impact, Part 1 of n-1

In this installment, we’ll start diving into the anatomy of an Impact module where you'll get the opportunity to absorb some of the features and implications before we dive into building something real and useful. In the course of conducting penetration tests, we often come across password hashes of various types. We can sometimes use these without cracking them, but, it is often useful and...
Article

Building Custom Modules for Core Impact, Part 3 of n-1

In our last installment, I gave you a final hunk of code with several function calls and decided to let you stew for a week before revealing what was going on under the hood. Well, you’ve stewed for a week, so let’s review. while DoneWithCrack == False: if not self.getTasks(str(self.getHashCatPath()).split("\\")[-1]): DoneWithCrack=True if os.path.exists(outputFile): f...
Article

Building Custom Modules for Core Impact, Part 2 of n-1

Last week, we discussed exactly what we’ll be building and got some of the boilerplate done along the way. I’m sure that you dug into the modules that I strongly hinted that you take a look at for inspiration. To review, this module will need to: Know where the Hashcat executable lives Know what hashes we want cracked Know the minimum password length to brute force Know the maximum password...
Article

The BIOS-Embedded Anti-Theft Persistent Agent that Couldn't: Handling the Ostrich Defense

Alfredo Ortega and Anibal Sacco presented their findings in Absolute Software’s Computrace “persistent agent” as part of their ongoing research on BIOS rootkits at Black Hat USA 2009. Before I dig into some technicalities of the findings of Alfredo and Anibal, let me dispel any doubts about the disclosure process that we followed. The vendor was made aware of the report and upcoming presentation...
Blog

How The Power of Core Impact is More Accessible Than Ever Before

Security teams are increasingly turning to penetration testing tools to advance their in-house programs through strategic exploitation automation. However, it can be challenging to round out a comprehensive and integrated pen testing toolset that meets both your organization’s requirements as well as your budget. In this blog, we’ll explore how Core Impact’s tiered offering provides flexibility...
Article

Reversing and Exploiting With Free Tools Series

The pen testing world is constantly changing and threat actors are continually finding new ways to exploit organizations of all industries and sizes. In order for pen testers to safely and efficiently test and expose security weaknesses, they enlist the help of different tools. This article series from cybersecurity expert Ricardo Narvaja provides tips and tricks on reversing and exploiting...
Blog

Why Privileged Access Management Matters Now More Than Ever

If the last year has demonstrated any lessons for IT and security teams, it’s this: managing privileged access should be a top priority for the business. When a large portion of the workforce began working remotely, there was a frenzy to extend access so individuals could perform their jobs from home. Yet this may have unintentionally caused inappropriate access levels to be extended to employees....
Datasheet

Voice Biometrics

Solution Overview Protecting access to business-critical data and applications is essential for organizations, but the increasing costs and security issues associated with self-service or helpdesk assisted password resets has continued to rise. One highly secure alternative that has emerged for quickly and accurately verifying an individual’s identity is through the use of his or her voice. Voice...
Article

Reversing & Exploiting With Free Tools: Part 7

In part 6, we learned how to understand a shellcode and its resolver. Now, we will continue with the analysis and resolution of abo2 in GHIDRA. Download ABO2 executable. The latest version is on Google drive. You can find the 7zip compressed file the executable (.exe extension), the symbols (.pdb extension), and the source code (.c extension). ...
Blog

Three Ways an Identity Governance Solution Should Integrate with Enterprise Data

Chances are your organization is relying on an extensive number of enterprise applications, systems, and platforms to ensure successful execution of the business. According to an article in The Wall Street Journal, large organizations rely on an average of nearly 130 applications across their business, while smaller firms use around 70 applications on average. The ability to manage user access to...
Article

Reading DPAPI Encrypted Keys with MimiKatz

As you may already know, when a penetration test or Red Team exercise in being executed, it is important to define the objective of the project. Sometimes it is not enough to get Domain Admin privileges, so the objective may instead be defined as access to a particular network segment or a user’s workstation where credentials and sensitive information could be stored. For the purposes of this...
Article

Analysis of Cisco AnyConnect Posture (HostScan) Local Privilege Escalation: CVE-2021-1366

Authored by: Marcos Accossatto On August 5th, ethical hacker and cybersecurity professional Antoine Goichot posted on twitter that three vulnerabilities he had discovered on Cisco AnyConnect (CVE-2020-3433, CVE-2020-3434, and CVE-2020-3435) were now public. The next day, he published a follow-up blogpost on github. That lead to an investigation by the Core Security team to find additional...
Blog

The Importance of Static Application Testing and Application Pen Tests

Pen testing is a well-established practice for many organizations. With such diverse environments consisting of different applications from different vendors, it’s safe to assume security weaknesses are lurking somewhere. But why aren’t these security flaws found earlier, by the creators themselves? In this blog, we’ll explore why applications should also go through security testing and review...
Blog

Remote Work Is Here to Stay: How to Deal with Access Risks Across an Expanded Workforce

While no one could have anticipated the way in which COVID-19 would change the workforce over the last year, perhaps even more unexpected is the lasting impact the pandemic will have on remote work. With millions of employees still working from home, organizations are especially vulnerable because they lack visibility into the actual access levels employees possess across the collaboration tools...
Guide

2021 SIEM Report

SIEM Solutions Remain a Critical Part of Security Portfolios Security Information and Event Management (SIEM) solutions have been around for well over a decade, helping organizations streamline their security by managing security events. They are now well known for their ability to collect, aggregate, and analyze log and event data from systems across the IT stack in order to monitor, identify,...
Video

What's new in Core Impact 19.1

Core Impact version 19.1 has new functionality for web applications testing, along with enhancements made to all other attack vectors. Additionally, updates have been made to local information gathering modules, as well as libraries and embedded features. The video below highlights the other new features for performing penetration tests. ...