Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

CORE Security Enhances Penetration Testing Solution

CORE Impact Pro Release 12.3 Provides Enhanced Endpoint, Mobile, Web and Wireless Testing Capabilities

CORE Impact Pro Release 12.3 Provides Enhanced Endpoint, Mobile, Web and Wireless Testing Capabilities

Following recent updates to its CORE Insight Enterprise security intelligence solution, CORE Security Technologies, a Boston, Massachusetts-based provider of security testing solutions, on Monday announced significant enhancements to its vulnerability assessment and penetration testing software, CORE Impact Professional.

New enhancements let security teams proactively test endpoints at the operating system (OS) and application levels without the need to challenge end-users through social engineering.

According to the company, the latest version (Release 12.3) of CORE Impact details how network systems and devices, endpoints, web applications, wireless networks and mobile devices can be compromised by replicating a broad range of attacks through an extensive library of more than 2,500 exploits and other attack techniques.

CORE Security LogoNew Testing Features Include:

Endpoint Assessment with No End-User Involvement – CORE Impact can now assess client-side applications and operating systems within Microsoft Windows and Mac OS X-based laptop and desktop computers prior to deployment in live environments.

Customizable Phishing Email Template Interface – When social engineering tests are required to assess end-user security awareness, CORE Impact 12.3 makes it easier for security professionals to customize email templates to replicate spear phishing attacks tailored to target the organization.

WPS-Enabled Device Information Gathering – CORE Impact now enables IT security teams to discover and record information from deployed laptop and desktop computers including WiFi Protected Setup (WPS), name, model, serial number and manufacturer.

Man-in-the-Middle (MITM) Wizard – Allows users to create fake access points and perform predefined Man-in-the-Middle (MITM) tests against WiFi clients through high-interaction “honeypots.” Predefined actions can include WiFi client credential collection, redirection of clients to alternate web servers, or injection of exploits or other changes into their Internet traffic.

Certificate-Based Authentication – CORE Impact can now impersonate regular authenticated users of a web application to discover vulnerable areas that could be leveraged to compromise sensitive data and assets.

Mobile Browser Impersonation – By impersonating mobile browsers, CORE Impact helps find vulnerabilities that are only accessible in mobile versions of web applications.

Acunetix Web Scanner integration – Enables users to import and validate Acunetix vulnerability scan results to identify critical, exploitable web application weaknesses. CORE Impact Pro also integrates with HP Web Inspect, IBM AppScan, and NTOSpider.

In addition to new security testing features, Release 12.3 brings several new and enhanced vulnerability testing reports.

Written By

Click to comment

Expert Insights

Related Content

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.