June 01, 2004
Core Security TechnologiesProduct:
- Ease of Use:
- Value for Money:
- Overall Rating:
Functionality and flexibility.
An extremely capable tool for penetration testing.
The use of Core Impact might be considered as training. Your IS personnel will develop and hone their skills as they discover the product's considerable capabilities. Eventually, they will be writing their own scripts and modules (using the open source Python language utilized by the product) to meet the enterprise's special needs.
Core Security Technologies also offers penetration testing consulting and new users may take advantage of this early on to ensure they make the most of this product.
The operational concept uses modules that are developed to undertake tasks such as port scanning, network analysis and penetration "exploits." A comprehensive set of modules is provided as standard and these may be easily updated online to ensure that you have the most current capabilities.
Agents may be deployed strategically to run these modules, and a central database provides a log of this activity with all the information appertaining to the target network.
The level of detail provided is interesting and the provided modules are well documented to explain what they run against and why. When they are run, a summary shows which are active together with start and finish times, while a real-time tabbed window provides a choice of simple outputs or a comprehensive view of exactly what is going on. This is all within a logical and intuitive interface and offers powerful and useful functionality.
Collections of modules may be saved as a project work space for subsequent recall, enabling a consistent approach to penetration testing within your organization.
Reporting capabilities are extensive and will provide a valuable insight into the infrastructure and tests run against it. For organizations that do penetration testing, Core Impact might become their most valued tool.
SC Magazine Articles
- Was Spotify breached? Account info shows up on Pastebin
- Report: Ransomware feeds off poor endpoint security
- Researcher finds backdoor that accessed Facebook employee passwords
- Over 7M Minecraft mobile credentials exposed after Lifeboat data breach
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- FBI investigating attack against computer networks at U.S. law firms
- Pros examine Mossack Fonseca breach: WordPress plugin, Drupal likely suspects
- First Choice Credit Union files class-action suit against Wendy's over breach
- Top NFL prospect Tunsil free falls in draft after apparent hacker posts damaging video, texts
- Researchers spot Android Infostealer disguised as Chrome update
- Researchers spot mobile malware competition on the black market
- Judge ruled go ahead for claims of phone hacking against UK tabloid