Exploit types

  • Phishing, SQL, Brute Force DDOS

Teaming

  • Red teams, blue teams, purple teams

k 

 

Pen testing tools

open source, enterprise, or an arsenal

Vulnerability scanning

 

Pen testing services

 

Pen Test Pivoting

We’re excited to share what’s new in Core Impact v21.8! This release is all about making your penetration testing workflows more efficient, more integrated, and easier to manage. Let’s dive into the highlights.

Getting a higher return on investment with purple teams

Red and Blue Teams have historically had an adversarial role, serving to work against one another in order to test an organization's security. However, pitting these teams on opposite sides is no longer an effective strategy. In this guide from security analyst SANS, sponsored by Core Security, we examine how the concept of a Purple Team, and how this approach can:

There’s a dangerous misconception sweeping the security industry: Hackers and their cunning attacks are more sophisticated than our best efforts to defend against them. It may seem that the skills gap between the attackers and the protectors is so wide and growing so fast that it’s impossible to catch up.

But that's not true, thanks to penetration testing. In our guide, we explore: