Resources

Blog

Prioritizing Cybersecurity During Organizational Change

The times, they are a changin', as Bob Dylan would say. It's a time of a lot of global change, leading to dramatic shifts in different industries. Organizations have to be agile and change along with it, all while keeping cybersecurity top of mind. New changes mean new attack vectors One thing that comes with new changes are new attack vectors. That's why organizations need to stay vigilant during...
Video

Prioritizing Blue Team Success Over Red Team Wins

Though red teaming is sometimes perceived as pen testing with the gloves off, in reality, the goal of these engagements isn’t to prove how much damage these skilled testers can do. Modern red teams must set out to provide learning opportunities for organizations and their blue teams, running attack simulations to help teach them how to better protect their infrastructure against real-world attacks...
Blog

Three Reasons Why Organizations Should Always Retest After an Initial Pen Test

What’s the point of establishing a baseline if you don’t intend to track your progress? When organizations only run an initial pen test, they are only getting half the picture. A pen test is used to give a business a baseline idea of how well their systems would stack up against hackers who wanted to exploit vulnerabilities. Once the results are delivered, it’s up to the team to implement those...
Blog

Active Directory Attack Paths Discovery: Leverage the Power of BloodHound Within Core Impact

Some time ago, Core Impact added a module that supports the use BloodHound, a data analysis tool that uncovers hidden relationships within an Active Directory (AD) environment. This module enabled the collection of Active Directory information through the Agent using SharpHound. Additional modules have now been added to allow Core Impact users to further utilize Bloodhound. In this blog, we’ll...
Blog

The Danger of Overconfidence in Cybersecurity

There’s something positive about a healthy degree of fear. It lets us understand our own limitations, heightens our senses, and keeps us alive. The tendency to err on the side of caution was called out in our recent 2023 Penetration Testing Report as a smart practice when it comes to cybersecurity. In fact, though security professionals reported less confidence in their security posture, this loss...
Blog

Upskilling and Reskilling Your IT Team With User Friendly Offensive Security Tools

As cybersecurity needs continue to rise, it’s no secret that organizations are having to do more with less. In any given company one can find modern-day use of the old adage, “Patch it up, wear it out, make it do or do without.” That make it do part is exactly what upskilling and reskilling is all about. As companies respond to growing threat appetites with fewer qualified personnel in the job...
Datasheet

Offensive Security Suite

Fortra’s Offensive Security Suite is comprised of three distinct enterprise-grade tools: Core Impact tests exploitation paths and lateral movement, Cobalt Strike enables advanced adversary tactics for Red Team operations, and OST provides a broad arsenal for evasive attack simulation. Additionally, this suite provides exclusive Cobalt Strike Research Labs access plus operator training. Ideal for...
Blog

The Advantages of Cybersecurity Vendor Consolidation

First there was the boom – now there’s the bust. Organizations that invested in myriad new solutions to handle the complexity of myriad security problems now have a different problem on their hands – how do you handle all of the vendors? Companies are finding there’s a different kind of noise when too many providers are in the mix, and they’re looking to cut back. They still need the effectiveness...
Guide

The White House's 2023 National Cybersecurity Strategy

In March of 2023, the White House released their National Cybersecurity Strategy to establish their dedication to helping create a more secure cyberspace. This robust document encapsulates this ambitious strategy in five core pillars: Defending critical infrastructure Disrupting and dismantling threat actors Shaping market forces that drive security and resilience Investing in a resilient future...
Blog

Pen Testing Across the Environment: External, Internal, and Wireless Assessments

Do you know the difference between internal pen tests, external pen tests, and wireless pen tests? It matters.With the threat landscape expanding and criminals taking advantage of security gaps, organizations are turning to controls that can help them limit their exposure. Among other controls, penetration testing stands out because it simulates attackers' malicious activities and tactics to...
Blog

The Role of In-House Penetration Testing

Security adviser Roger Grimes once famously wrote, "To beat hackers, you have to think like them.” Grimes explained that security professionals should step into the attackers’ shoes and seek how to break into corporate systems, discover weaknesses, and create robust security countermeasures. Walking the walk of an attacker is what penetration testing is all about. What is In-House Pen Testing? ...
Guide

A Simple Guide to Successful Red Teaming

Red Team engagements simulate malicious activities of a long-term embedded threat actor and serve as a valuable learning experience for the target organization's security team. While it was once seen as a nice addition to a strong security posture, red teaming is now a crucial way to gain real-world experience against dangerous exploits. In this guide, get an overview of red teaming, including: ...
Video

The Practice of Pen Testing: 2023 Survey Results Revealed

With penetration testing becoming an increasingly universal part of security strategies and compliance requirements, knowledge sharing and analysis grows more critical when defining best practices. As part of our ongoing commitment to improving cyber resilience through proactive security assessments, Fortra's Core Security conducts an annual survey of cybersecurity professionals on the usage and...
Guide

2023 Pen Testing Report

Over the years, penetration testing has become an integral component of proactive approaches to security, evaluating and prioritizing risk before breaches occur. Through the exploitation of identified security vulnerabilities, penetration testing can effectively measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved...
Blog

An IBM i Hacking Tale

So why are we talking about hacking of an IBM i? I think that's certainly not a headline we see very often, as IBM i systems have been considered un-hackable for years. Anyone who has worked on IBM i has heard some of these statements: “Nobody Can Hack an IBM i.” “Never in my 40 years in the business has anyone hacked an IBM i!” “IBM i’s don’t have hacking problems like Windows...
Article

Understanding the CVE-2022-37969 Windows Common Log File System Driver Local Privilege Escalation

In this article we would like to share the analysis and work done on CVE-2022-37969 to build a functional PoC based on previously published information by Zscaler. Here we will complement the available information by adding details, guiding the reader to the in-depth understanding of the vulnerability, exploiting it, reversing the patch, and the creation of a functional PoC. Here is a summary of...
Blog

Vintage Vulnerabilities: New Attacks Can Exploit Old Weaknesses

Popular entertainment would have us believe that hackers are all sophisticated attackers ready to strike the latest vulnerabilities. That is sometimes true, but it’s become increasingly apparent that whether it’s the latest zero-day bug or something that was discovered the same year Apple released the iPad, hackers are equal-opportunity offenders. "Classic" Vulnerabilities Cybersecurity...
Blog

Hardware Call Stack

Lately, there has been an important increase in the relevance of valid call stacks, given that defenders have started to leverage them to detect malicious behavior. As several implementations of “Call Stack Spoofing” have come out, I decided to develop my own, called Hardware Call Stack. Call stack spoofing 101 To create a credible call stacks, I decided to use the technique developed by William...