Core Impact Pro Data Sheet
Core Impact Pro Data Sheet
Core Impact Pro Data Sheet
RECOGNITION
“With Core Impact Pro, we were able to find several “Typical Core Security quality. We have used
weaknesses before they became issues. We were also this product extensively and never been
able to verify which of our network defenses were disappointed. Best Buy.”
performing up to expectations, and as a result our
network is now significantly more resilient.” SC Magazine, review of Core Impact Pro
• Leverage compromised systems as beachheads to attack other • Import and validate results from web vulnerability scanners to
network resources through VPN and proxy pivots confirm exploitability and prioritize remediation
• Test defensive technologies’ ability to identify and stop attacks • Pivot attacks to the web server and backend network
• Web services testing for web and mobile applications
CLIENT-SIDE TESTING OF END USERS AND ENDPOINTS
• Crawl sites, search engines, etc. for potential target information MOBILE DEVICE PENETRATION TESTING
• Leverage a variety of templates or create custom phishing emails • Identify critical exposures posed by mobile devices on your network
• Use client-side exploits to test endpoint system security, assess • Evaluate the security of new mobile devices and related web
defenses, and pivot to network tests services prior to deployment
• Test security awareness with or without exploiting systems • Access call and text logs, GPS data, and contact entries
• Embeddable Android Agent for Android devices
IDENTITY DISCOVERY & PASSWORD CRACKING
• Discover Windows NTLM hashes and attempt to determine VULNERABILITY SCAN VALIDATION
plaintext passwords for those hashes
Core Impact Pro can import and validate the exploitability of results from
• Discover identities: usernames, passwords, Kerberos tickets/ the following network and web vulnerability scanners:*
e-keys, and SSH keys
• Acunetix® Web • TripWire IP360™
• Utilize learned identities as part of multi-vector tests
Security Scanner • Rapid7 AppSpider
• Automatically take control of systems via weak authentication
• Retina® Network
manually or with the rapid penetration test wizard (RPT) • Rapid7 Nexpose
Security Scanner
• Qualys QualysGuard®
• GFI LANguard™
WIRELESS NETWORK PENETRATION TESTING • SAINTscanner®
• HP Web Inspect®
• Assess WEP, WPA-PSK and WPA2-PSK encrypted networks • Tenable Nessus®
• IBM AppScan®
• Conduct man-in-the-middle attacks, intercept wireless • Tenable Security Scanner®
transmissions, and insert exploits into relayed traffic • IBM Internet Scanner®
• Tenable SecurityCenter™
• Impersonate access points to target Wi-Fi enabled systems • Lumension® Scan
• Trustwave App Scanner
• Portswigger Burp Suite
SURVEILLANCE CAMERA ATTACKS • McAfee® Vulnerability Manager
• Testing teams can identify whether a host on their network is a
camera and then test it for vulnerabilities *A vulnerability scanner is not required to use Core Impact Pro®
• Ability to prove camera vulnerabilities by taking a still shot of the
video feed, or accessing the camera’s administration interface
• Testing video cameras using can be done manually or with the
RPT wizard