Resources

Blog

3 Ways Core Impact Can Benefit Large Security Teams

As the need for regular security assessments continues to grow, penetration testing tools are helping organizations advance their in-house programs through strategic automation. However, there is a misconception that automated tools are best for those with a reduced headcount, like small teams or individuals. Fortunately, Core Impact is designed with every team in mind, and offers capabilities...
Video

Core Provisioning Quick Look Demo

Learn more about streamlined access provisioning with this quick look into Core Provisioning. This overview provides you a tour of the solution and shows exactly how Core Provisioning automates the creation and management of user accounts and access rights. You'll see how you can have complete context of the relationships between users, access rights, resources, and user activity and compliance...
Video

Best Practices for Effective Phishing Campaigns

Phishing has been around almost as long as the Internet. While some attempts can be spotted a mile away, others have grown increasingly sophisticated. Even the best enterprise spam filters can’t catch every malicious communication. Unfortunately, a single careless click from an employee can have devastating consequences for the entire organization. But what’s the best way to improve employee...
Blog

New Approaches to the SWIFT and PCI-DSS Framework

THE WORLD OF COMPLIANCE At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there was this unfortunate incident three years ago (no, you don’t want to hear...
Blog

Pros and Cons for Puppet's Configuration Management & Security

THE GOOD, THE BAD AND THE UGLY I was at the Red Hat Summit in Boston at the end of June. We had a lot of activity at our exhibitor stand, and a lot of discussions being passed on to me by our sales team I continued to have the same conversation again and again over the three days. This seems to be the year people have finished bedding down Puppet in their server/VM infrastructure, and are looking...
Video

Core Password Quick Look Demo

Learn more about secure self-service password management with this quick look into Core Password. This overview provides you a tour of the solution and shows exactly how Core Password ensures that password policies are consistently enforced. ...
Video

Core Compliance Quick Look Demo

Learn how to simplify managing access privileges and certifications with this quick look into Core Compliance. This overview provides you a tour of the solution and shows exactly how Core Compliance enables you to identify and manage access rights across systems, platforms, and applications in a single system. ...
Datasheet

Department of Energy Core Security Blanket Purchase Agreement (BPA)

Core Security's Blanket Purchase Agreement (BPA) with the Department of Energy (DOE) establishes a cooperative agreement that streamlines the purchase process, allowing Core Security to efficiently fulfill the recurring needs of the DOE, with their specific requirements in mind. Products Core Impact This penetration testing platform provides a framework for efficiently uncovering and safely...
Blog

6 Steps to Better Securing the Internet of Things (IoT)

These days, an organization’s technology stack isn’t merely computers and servers. The Internet of Things (IoT)—a catch all term for the many different devices that have sensors or software that connect them to the Internet—has carved out a foothold in every industry. Hospitals are filled with devices that monitor patient status, farmers are using sensors placed in the ground to obtain data about...
Blog

Getting Inside the Mind of an Attacker Part 5: Final Words of Advice

Authored by: Julio Sanchez In part four of this series, we examined a penetration testing engagement that the Core Security Services team performed, exploring an insider attacker engagement that showed one of the ways an attacker can escalate their privileges using Kerberos tickets. The four scenarios presented over the course of this series demonstrate the many types of attacks, both internal and...
Blog

Ways Hackers Look to Exploit State and Local Governments

Don’t for a minute think that bad actors have no interest in the information you collect in your state or local office. Whether you work for the City Water Department or the Department of Tax and Revenue for your county, you are collecting data that is critical to not only your job – but for all of the organizations and people that work and live within your territory. Even if you aren't employed...
Blog

Adapting to a Changed World: 6 Cybersecurity Predictions for 2021

As a new year looms bright with possibility in front of us, how can we prepare for a world that looks profoundly different than it did a year ago? On the cybersecurity front, we can always anticipate continuing battles with familiar foes, as well as a few new challenges on the horizon. Though we may not have a crystal ball, based on our observations and discussions, here are six predictions for...
Blog

Finding Clarity in the Chaos: 5 Cybersecurity Trends of 2020

As 2020 comes to an end and we anticipate gleefully tossing our calendars in the garbage, we can all agree it was one of the most tumultuous years in recent history. It was a difficult time for almost every person and industry, and cybersecurity was certainly no exception, with shocking breaches, mass transitions to remote working, and threat actors thriving as the pandemic raged on. Though we’re...
Article

Exploitation Chains in Lightweight Desktop Applications

Authored by: Ramiro Molina In the past several years, many desktop applications—especially clients for cloud-based products—have transitioned into lightweight or web-based desktop client applications. These applications are moving away from the concept of heavily implementing logic in distributed executables. Instead, they use an embedded web browser or another similar technology to load a...
Blog

Why Identity Governance Is Essential for Segregation of Duties (SoD)

It’s no secret that organizations today face a constant onslaught of identity-related access risks within the current threat landscape. One of the most critical and potentially damaging access risks that can exist under the surface of an organization is the lack of controls to ensure adequate segregation of duties (SoD). Throughout this blog, we will examine what it means to segregate duties...
Article

Reversing & Exploiting With Free Tools: Part 6

In part 5, we completed our analysis of Stack4 using IDA Free. In this next part, we’ll be solving ABO1, using RADARE. The first thing we need to do is to find the binary information located in ABO1_VS_2017.exe. Go to the folder where the executable is and extract it using rabin2. Using RABIN2 rabin2 -l ABO1_VS_2017.exe There is a lot of information...
Blog

Interoperability with Cobalt Strike and Other Notable New Features in Core Impact 20.3

The latest release of Core Impact has arrived! Version 20.3 showcases our commitment to creating a comprehensive, streamlined process for testing the defenses of any IT environment. At the forefront of this effort is the debut of exciting new interoperability capabilities with our red teaming platform, Cobalt Strike. Additionally, this latest release includes new features focused on both...
Video

Cybersecurity in a Chaotic Time: 2020 Trends and 2021 Predictions

2020 has been a chaotic year. From the far-reaching impact of COVID-19 to the increasing number of data breaches across nearly every sector, the threat landscape continues to intensify and the importance of cybersecurity continues to grow. The cybersecurity trends of 2020 teach us valuable lessons that are important to understand for the coming year. These trends focused on protection of customer...
Blog

3 Reasons You May Need to Rethink Your Virus Protection Strategy

These days, encountering malware like viruses, ransomware, trojans, or worms has become all too common—it’s almost an inevitability. In fact, according to the 2020 Malware Report by Cybersecurity Insiders, 88% see malware as an extreme or moderate threat, and 75% believe malware and ransomware will increase in the next year. As this threat continues to loom, almost all organizations have antivirus...
Blog

A Day in the Life of a Pen Tester

When someone says “pen test,” you’re not alone if you pictured someone clicking a ball point pen top, drawing scribbles to see if any ink comes out. But if you keep listening, it actually seems like pen testers are paid to hack into computers all day long. So what do they actually do? We went behind the scenes, taking a closer look at the day in the life of a pen tester.