Security Experts:

CORE Security Enhances Penetration Testing Solution

CORE Impact Pro Release 12.3 Provides Enhanced Endpoint, Mobile, Web and Wireless Testing Capabilities

Following recent updates to its CORE Insight Enterprise security intelligence solution, CORE Security Technologies, a Boston, Massachusetts-based provider of security testing solutions, on Monday announced significant enhancements to its vulnerability assessment and penetration testing software, CORE Impact Professional.

New enhancements let security teams proactively test endpoints at the operating system (OS) and application levels without the need to challenge end-users through social engineering.

According to the company, the latest version (Release 12.3) of CORE Impact details how network systems and devices, endpoints, web applications, wireless networks and mobile devices can be compromised by replicating a broad range of attacks through an extensive library of more than 2,500 exploits and other attack techniques.

CORE Security LogoNew Testing Features Include:

Endpoint Assessment with No End-User Involvement - CORE Impact can now assess client-side applications and operating systems within Microsoft Windows and Mac OS X-based laptop and desktop computers prior to deployment in live environments.

Customizable Phishing Email Template Interface - When social engineering tests are required to assess end-user security awareness, CORE Impact 12.3 makes it easier for security professionals to customize email templates to replicate spear phishing attacks tailored to target the organization.

WPS-Enabled Device Information Gathering - CORE Impact now enables IT security teams to discover and record information from deployed laptop and desktop computers including WiFi Protected Setup (WPS), name, model, serial number and manufacturer.

Man-in-the-Middle (MITM) Wizard - Allows users to create fake access points and perform predefined Man-in-the-Middle (MITM) tests against WiFi clients through high-interaction “honeypots.” Predefined actions can include WiFi client credential collection, redirection of clients to alternate web servers, or injection of exploits or other changes into their Internet traffic.

Certificate-Based Authentication - CORE Impact can now impersonate regular authenticated users of a web application to discover vulnerable areas that could be leveraged to compromise sensitive data and assets.

Mobile Browser Impersonation - By impersonating mobile browsers, CORE Impact helps find vulnerabilities that are only accessible in mobile versions of web applications.

Acunetix Web Scanner integration - Enables users to import and validate Acunetix vulnerability scan results to identify critical, exploitable web application weaknesses. CORE Impact Pro also integrates with HP Web Inspect, IBM AppScan, and NTOSpider.

In addition to new security testing features, Release 12.3 brings several new and enhanced vulnerability testing reports.

view counter