Resources

Blog

Core Impact Update: Version 21.5 Release

We are thrilled to announce the latest release of Core Impact! Version 21.5 is packed with exciting features and improvements that provide a smoother and even more efficient user experience. Some of the new features include the option to use Impacket’s NTLMrelayx module to relay connections during an Active Directory attack, various coercion methods to trigger authentications into the relay...
Blog

Debunking Popular Myths About Pen Testing

When it comes to a security staple like penetration testing, we all have preconceived notions that make this practice seem quite challenging. The need to rotate vendors, interruptions to normal business, or even testers causing security risks are some that you often hear thrown around. But are they true? The short answer is no. In this blog, we’ll put these myths to rest and bring the truth about...
Article

Core Impact Monthly Chronicle: Exploits and Updates | Nov 2023

One of Core Impact’s most valuable features is its certified exploit library. Fortra’s Core Security has a team of expert exploit writers that conduct research, evaluating and prioritizing the most relevant vulnerabilities in order to update the library with critical and useful exploits. Additionally, the QA team creates its own clean environment to validate each exploit before its release to...
Blog

How to Recover After Failing a Cybersecurity Audit

While it’s important to adhere to compliance regulations, blunders do happen. What does it mean when these blunders lead to you failing a cybersecurity audit, and how can you recover? Consequences of Failing a Cybersecurity Audit Failing a cybersecurity audit can mean several things. First, there’s the up-front legal fines that come with falling on the wrong side of compliance. Here are a few...
Article

Core Impact Monthly Chronicle: Exploits and Updates | Oct 2023

One of Core Impact’s most valuable features is its certified exploit library. Fortra’s Core Security has a team of expert exploit writers that conduct research, evaluating and prioritizing the most relevant vulnerabilities in order to update the library with critical and useful exploits. Additionally, the QA team creates its own clean environment to validate each exploit before its release to...
Blog

5 Things You Didn’t Know About Core Impact

You may have heard that Core Security’s Core Impact is an enterprise-grade penetration testing solution that uses same tactics and techniques as real-world attacks. You may have heard that it’s automated and easy-to-use, so teams of any prior skill level can leverage the same advanced attacks. And you may have even heard that it can automate routine tasks as part of the overall engagement, so more...
Article

Running PEs Inline Without a Console

While reading the amazing Inline-Execute-PE by Octoberfest7, I noticed that to obtain the output from the PE being executed, the author needed to allocate a console, which results in a process being created (conhost.exe). Interestingly, the readme also states that a commercial C2 managed to avoid spawning a conhost.exe process by "fooling Windows into thinking it had a console." After reading this...
Video

Cobalt Strike Introduction and Demo

Cobalt Strike helps organizations conduct advanced adversary simulations and Red Team engagements with ease, allowing your organization to effectively measure your security operations program and incident response capabilities.This on-demand Cobalt Strike demo includes a guided walkthrough of using Cobalt Strike in a small cyber range. The demo touches on several security topics to help...
Article

Impacket Updates: We Love Playing With Tickets

After the latest Impacket release, we have continued the process of integrating functionality submitted during the gap between the 0.10 and 0.11 releases. In this blog, we will highlight three items that were in our backlog during that period, which are now in the process of being fully implemented into the tool. All of them are related to kerberos functionality. ...
Datasheet

Wireless Network Pen Testing

Wireless Penetration Testing Wireless networks are appealing attack targets since they don’t require an attacker to be in the physical building, only in the vicinity. While it’s challenging to prevent wireless network attacks, there are some proactive measures you can take to make it harder for cybercriminals to succeed, including penetration testing. Our wireless penetration testing methodology...
Blog

Best Security Practices for Digital Banking

Online banking is nearly universal in 2023. No more long lines at the credit union, late-night ATM trips, or waiting for a check to be cashed. Digital banking has revolutionized the financial industry and the way we do business as a whole. However, it has also indelibly increased the risk of cyberattacks, social engineering scams, and online compromise to the financial community. Here are some...
Blog

Accelerating Security Maturity with Fortra Bundles

In The Importance of Layering Offensive Security Solutions, Fortra experts underscore the advantage of developing a single source offensive security tooling portfolio. Read on to find out the necessary ingredients for a proactive strategy and why Fortra’s ability to combine and maximize solutions optimizes security and produces the most effective outcomes. The Five Elements of an Offensive...
Blog

Cybersecurity Heats Up in the Summer

When school is out for summer, it seems like everyone is on vacation – everyone except your (un)friendly neighborhood cybercriminals. Something about the summer months puts us off our guard and threat actors on high alert. The only way to stay safe is to know what’s causing the trouble in the first place. We’ve packed our sunscreen – now read on to find out how to make sure your security also...
Article

Getting Physical: Extreme abuse of Intel based Paging Systems - Part 1

Hi, After Enrique Elias Nissim (@kiqueNissim) and I presented "Getting Physical: Extreme abuse of Intel based Paging Systems" at CanSecWest2016, I decided to write a series of blog posts explaining in detail what we presented and show what we couldn't in a full time talk (50 minutes of presentation is a lot but not in this case !). The idea of these blog posts is to explain how the Windows/Linux...
Blog

Standardizing Red Teaming for the Financial Sector with the TIBER EU Framework

Cyber attacks may not have been around when Ben Franklin said, “By failing to prepare, you are preparing to fail,” but it has become an appropriate cybersecurity principle, nonetheless. So what does preparation involve and how are organizations ensuring that is integrated into their security strategy? One example is the TIBER EU Framework, a set of standardized red teaming procedures designed for...
Article

Impacket v0.11.0 Now Available

We are thrilled to announce a new version of Impacket! After months of hard work and dedication, Impacket v0.11.0 is now available and has a bunch of new and exciting features. We can’t wait for you to explore and enjoy the added capabilities that come with this version! Let’s take a look at everything new included in this release. What’s New in Impacket v0.11.0? Long Live the Golden Tickets In...
Datasheet

Offensive Security Bundles & Suites from Fortra

To stay ahead of cyber threats, organizations must anticipate attacks and eliminate weaknesses before they are exploited. This requires offensive security tactics delivered by an effective set of proactive tools that include pen testing, red teaming and vulnerability management. With our bundle and suite offerings, we simplify the process of assembling a layered offensive security stack by...
Video

Bundling Up: The Importance of Layering Offensive Security Solutions

How can we do more with less? It’s a question all cybersecurity teams are asking themselves as they are confronted with more attacks and fewer resources. A proactive strategy that layers offensive security solutions like vulnerability management, pen testing, and red teaming can give your team the capabilities and efficiency it needs to identify threats and protect your critical assets. In this...
Blog

Underestimating the Why of Ransomware

Organized ransomware isn’t slowing down – in fact, a group just discovered a month ago is already responsible for dozens of attacks – and they are experts at discovering weaknesses we miss. With so many sophisticated new security tools and so much stack investment, how do we continue to play catch-up to roving ransomware groups? Because the reality is, we’re all prone to making mistakes. The 2023...
Article

Analysis of CVE-2023-28252 CLFS Vulnerability

Recently, the Nokoyawa ransomware group, which has been active since In February 2022, was found to be exploiting a Windows zero-day vulnerability in one of its attacks. This vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. In April 2023, Microsoft released a patch for this...