CORE Impact Pro Release 12.3 Provides Enhanced Endpoint, Mobile, Web and Wireless Testing Capabilities
Following recent updates to its CORE Insight Enterprise security intelligence solution, CORE Security Technologies, a Boston, Massachusetts-based provider of security testing solutions, on Monday announced significant enhancements to its vulnerability assessment and penetration testing software, CORE Impact Professional.
New enhancements let security teams proactively test endpoints at the operating system (OS) and application levels without the need to challenge end-users through social engineering.
According to the company, the latest version (Release 12.3) of CORE Impact details how network systems and devices, endpoints, web applications, wireless networks and mobile devices can be compromised by replicating a broad range of attacks through an extensive library of more than 2,500 exploits and other attack techniques.
New Testing Features Include:
• Endpoint Assessment with No End-User Involvement – CORE Impact can now assess client-side applications and operating systems within Microsoft Windows and Mac OS X-based laptop and desktop computers prior to deployment in live environments.
• Customizable Phishing Email Template Interface – When social engineering tests are required to assess end-user security awareness, CORE Impact 12.3 makes it easier for security professionals to customize email templates to replicate spear phishing attacks tailored to target the organization.
• WPS-Enabled Device Information Gathering – CORE Impact now enables IT security teams to discover and record information from deployed laptop and desktop computers including WiFi Protected Setup (WPS), name, model, serial number and manufacturer.
• Man-in-the-Middle (MITM) Wizard – Allows users to create fake access points and perform predefined Man-in-the-Middle (MITM) tests against WiFi clients through high-interaction “honeypots.” Predefined actions can include WiFi client credential collection, redirection of clients to alternate web servers, or injection of exploits or other changes into their Internet traffic.
• Certificate-Based Authentication – CORE Impact can now impersonate regular authenticated users of a web application to discover vulnerable areas that could be leveraged to compromise sensitive data and assets.
• Mobile Browser Impersonation – By impersonating mobile browsers, CORE Impact helps find vulnerabilities that are only accessible in mobile versions of web applications.
• Acunetix Web Scanner integration – Enables users to import and validate Acunetix vulnerability scan results to identify critical, exploitable web application weaknesses. CORE Impact Pro also integrates with HP Web Inspect, IBM AppScan, and NTOSpider.
In addition to new security testing features, Release 12.3 brings several new and enhanced vulnerability testing reports.
More from SecurityWeek News
- Threat Hunting Summit Virtual Event NOW LIVE
- Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone
- Threat Modeling Firm IriusRisk Raises $29 Million
- SentinelOne Announces $100 Million Venture Fund
- Today: 2022 CISO Forum Virtual Event
- Cymulate Closes $70M Series D Funding Round
- SecurityWeek to Host CISO Forum Virtually September 13-14, 2022: Registration is Open
- Privilege Escalation Flaw Haunts VMware Tools
Latest News
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
