New CORE IMPACT Pro v9 penetration testing solution
Core Security Technologies released CORE IMPACT Pro v9, the latest installment of its flagship penetration testing software solution. The new version of CORE IMPACT Pro provides IT security managers with an improved level of visibility into their enterprise IT risks, allowing them to replicate real-world cyber attacks that reveal critical exposures on a regular basis.
The solution enables customers to test their environments against a broad range of threats, both within and across major attack vectors (web application, endpoint and network). New features include:
- Web application fingerprinting capabilities that enable testers to run known exploits for commercial off-the-shelf web applications, in addition to the product’s dynamically created web application exploits
- Built-in database intelligence that allows testers to uncover specific data exposed by web application vulnerabilities without requiring them to have knowledge of specific database queries
- Ability to run IMPACT Pro network, endpoint and web application penetration tests over WiFi networks for added convenience
New pre-exploitation capabilities:
- New OS fingerprinting capabilities allow testers to profile targets in a way that is more advanced and less invasive than that used by other security testing solutions
- New evasion techniques for testing the effectiveness of web application firewalls (WAFS), intrusion prevention systems (IPS), and data leakage prevention (DLP) systems
- Enhanced client-side automation for testing an endpoint system against multiple client-side exploits with a single click, adding efficiency and speed to security assessments
New post-exploitation capabilities:
- New password and cookie gathering capabilities extend the tester’s ability to replicate real-world cyber attacks by pinpointing the true implications of a system compromise
- Support for post-exploitation capabilities in SQL injection tests against web applications that leverage IBM DB2 databases, enabling testers to reveal the potential fallout from successful attacks
- Enhanced client-side agent connection capabilities allow testers to extend the “listening period” of deployed client-side agents for additional realism
- New client-side module autorun capabilities automatically run post-exploitation modules after an endpoint system is compromised, adding efficiency to client-side tests
- New browser man-in-the-middle attack capabilities allow testers to exploit the default configuration of browsers, forcing browser traffic to be executed via proxy through the penetration testing system