Core Impact Pro Data Sheet - E-SPIN Group · of Impact Pro RPT methods Surveillance Camera Attacks...

2
TM Replicate Real-World Attacks and Reveal Critical Security Exposures Core Impact® Pro is the most comprehensive soſtware soluon for assessing and tesng security vulnerabilies throughout your organizaon. Endpoint systems Passwords and idenes Mobile devices Wireless networks Web applicaons and services Network systems and devices Backed by 15+ years of leading-edge security research and commercial-grade development, Core Impact Pro allows you to evaluate your security posture using the same techniques employed by today’s cyber-criminals. Multi-Threat Surface Investigation Core Impact Pro is the only soluon that empowers you to replicate mul- staged aacks that pivot across systems, devices and applicaons, revealing how chains of exploitable vulnerabilies open paths to your organizaon’s mission-crical systems and data. Surveillance camera vulnerability tesng Web services tesng for web and mobile applicaons What-If Attack Analysis Demonstrate and document the severity of exposures by not only replicang how an aacker would compromise and interact with vulnerable systems, but also revealing exactly which data would be at risk and why. Commercial-Grade Exploits Only Core Impact Pro offers a stable, up-to-date library of commercial-grade exploits and real-world tesng capabilies. Core rounely delivers 30+ new exploits and other updates each month – all professionally built and tested by in-house researchers and developers. Product Overview “With Core Impact, we were able to find several weaknesses before they became issues. We were also able to verify which of our network defenses were performing up to expectaons, and as a result our network is now significantly more resilient.” - Assistant Vice President, Financial Services “Typical Core quality. We have used this product extensively and never been disappointed. Best Buy.” - SC Magazine, review of Core Impact Pro What They’re Saying Teaming Now mulple security testers have the capability to interact in the same workplace against the same environment across mulple copies of Core Impact Pro. This capability provides a common view of network targets that have been found and compromised. Reporting Core Impact offers the industry’s most comprehensive vulnerability reports. Confirm exploitable vulnerabilies to plan remediaon efforts View metrics that illustrate the efficacy of layered defenses Validate compliance with government and industry regulaons Remediaon validaon reporng capabilies ExCraft SCADA Pack Add-On Product Core Security partners with ExCraſt Labs to deliver enhanced SCADA exploits for Core Impact Pro. The SCADA pack by ExCraſt Labs targets over 50 exploits in various SCADA Systems that are deployed across many industries. This enhanced pack is updated with about 10 new exploits on average a month.

Transcript of Core Impact Pro Data Sheet - E-SPIN Group · of Impact Pro RPT methods Surveillance Camera Attacks...

Page 1: Core Impact Pro Data Sheet - E-SPIN Group · of Impact Pro RPT methods Surveillance Camera Attacks • • • an be done manually or with RPT wizards Local Region Contact E-SPIN

TM

Replicate Real-World Attacks and Reveal Critical Security Exposures

Core Impact® Pro is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization.

• Endpoint systems• Passwords and identities• Mobile devices

• Wireless networks• Web applications and services• Network systems and devices

Backed by 15+ years of leading-edge security research and commercial-grade development, Core Impact Pro allows you to evaluate your security posture using the same techniques employed by today’s cyber-criminals.

Multi-Threat Surface InvestigationCore Impact Pro is the only solution that empowers you to replicate multi-staged attacks that pivot across systems, devices and applications, revealing how chains of exploitable vulnerabilities open paths to your organization’s mission-critical systems and data.

• Surveillance camera vulnerability testing

• Web services testing for web and mobile applications

What-If Attack AnalysisDemonstrate and document the severity of exposures by not only replicating how an attacker would compromise and interact with vulnerable systems, but also revealing exactly which data would be at risk and why.

Commercial-Grade ExploitsOnly Core Impact Pro offers a stable, up-to-date library of commercial-grade exploits and real-world testing capabilities. Core routinely delivers 30+ new exploits and other updates each month – all professionally built and tested by in-house researchers and developers.

Product Overview

“With Core Impact, we were able to find several weaknesses before they became issues. We were also able to verify which of our network defenses were performing up to expectations, and as a result our network is now significantly more resilient.”

- Assistant Vice President, Financial Services

“Typical Core quality. We have used this product extensively and never been disappointed. Best Buy.”

- SC Magazine, review of Core Impact Pro

What They’re Saying

TeamingNow multiple security testers have the capability to interact in the same workplace against the same environment across multiple copies of Core Impact Pro. This capability provides a common view of network targets that have been found and compromised.

ReportingCore Impact offers the industry’s most comprehensive vulnerability reports. • Confirm exploitable vulnerabilities to plan remediation efforts• View metrics that illustrate the efficacy of layered defenses • Validate compliance with government and industry regulations• Remediation validation reporting capabilities

ExCraft SCADA Pack Add-On ProductCore Security partners with ExCraft Labs to deliver enhanced SCADA exploits for Core Impact Pro. The SCADA pack by ExCraft Labs targets over 50 exploits in various SCADA Systems that are deployed across many industries. This enhanced pack is updated with about 10 new exploits on average a month.

Page 2: Core Impact Pro Data Sheet - E-SPIN Group · of Impact Pro RPT methods Surveillance Camera Attacks • • • an be done manually or with RPT wizards Local Region Contact E-SPIN

TM

Web Application Penetration Testing

• • Dynamically generate exploits that can compromise security

Network Penetration Testing

• G•

• •

resources through VPN and proxy pivots•

Client-Side Testing of End Users and Endpoints• • Leverage a variety of templates or create custom phishing emails • Use client-side exploits to test endpoint system security, assess

defenses, and pivot to network tests•

Mobile Device Penetration Testing

• I• Evaluate the security of new mobile devices and related web services

prior to deployment • • Access call and text logs, GPS data, and contact entries• Embeddable Android Agent for Android devices

Wireless Network Penetration Testing

• Assess WEP, WPA-PSK and WPA2-PSK encrypted networks•

• Impersonate access points to target Wi-Fi enabled systems

Vulnerability Scan Validation

Core Impact Pro can import and validate the exploitability of results from the following network and web vulnerability scanners:

• Security Scanner•

Scanner• GFI LANguard™• HP Web Inspect®• IBM AppScan®• IBM Internet Scanner®• Lumension® Scan

• McAfee® Vulnerability Manager• TripWire IP360™• NTO Spider™• Qualys QualysGuard®• SAINTscanner® • Tenable Nessus®• Tenable Security Scanner®• Cenzic Enterprise®

A vulnerability scanner is not required to use Core Impact Pro.

Identity Discovery & Password Cracking•

passwords for those hashes• • •

of Impact Pro RPT methods

Surveillance Camera Attacks

• an be done manually or with RPT wizards

Local Region Contact

E-SPIN Group of Companies (Business Centre strategic presence across the region)E-SPIN SDN. BHD. (714753-U) (GST No: 001328111616)E-SPIN INTERNATIONAL LIMITED 億轉國際有限公司 (1970945)E-SPIN INTERNATIONAL PTE. LTD. (201312412W)

© 2014 Core Security Technologies & Core Insight are trademarks of Core SDI, Inc. All other brands

E-SPIN provides Core Security’s full range of products and technologies as part of the company’s vulnerability management, IT security audit, penetration testing and ethical hacking portfolio. In addition, E-SPIN provides consulting, training, and maintenance services for Core Security’s products for channel partner, multi-national corporations, public listed enterprises, federal and state government, cyber security, military and reseller customers throughout Asia Paci�c regions.See more at: http://www.e-spincorp.com email [email protected]