The Wayback Machine - https://web.archive.org/web/20111020075730/http://www.coresecurity.com/content/endpoint-testing-pro
info@coresecurity.com | +1.617.399.6980   Core Blog Core Blog Twitter LinkedIn
Products
SHARE

Penetration Testing Endpoint Systems and Applications Against Real-world Threats

Endpoint Penetration Testing with CORE IMPACT Pro

From traditional email-borne threats to increasingly common web-based malware attacks, endpoint devices remain a popular target for cyber-criminals looking for a way to infiltrate your network and peel back your layered defenses in search of valuable electronic assets, including backend databases.

Antivirus providers have conceded that the malware industry’s ability to create enormous volumes of widely-varied attacks – and to deliver those threats via otherwise legitimate web sites or applications –have created a situation that makes it nearly impossible to create defense mechanisms that can effectively keep up with the onslaught against endpoint devices.

CORE IMPACT gives you visibility into the efficacy of your endpoint defenses and reveals where your most pressing risks lie by enabling you to:

  • test desktops, laptops and workstations for OS, application and services vulnerabilities
  • gauge the effectiveness of anti-virus, IDS, NAC and other perimeter defenses
  • validate vulnerability scanner results to distinguish real threats from false positives
  • ensure that devices are properly configured and up-to-date with security patches
  • emulate multistaged threats testing both your perimeter and internal defenses using privilege escalation and pivoting techniques to drill down to your organization’s most critical assets

By using CORE IMPACT to proactively test your endpoint defenses, you can ensure that end-user systems remain protected from potential attacks – even when they travel outside of your organization’s secured perimeter.

Beat Attackers at Their Own Game with Commercial-Grade Client-Side Exploits

With IMPACT, you can level real-world exploits at endpoints in a controlled manner to safely assess system defenses using a simple drag-and-drop interface. IMPACT is built around a vast library of commercial-grade exploits that mimic real-world endpoint attack scenarios. You can also create your own custom exploits that leverage inside knowledge of your organization.

IMPACT’s extensive library of client-side exploits includes attacks that target:

  • Endpoint applications: e.g., web browsers, email clients, instant messaging, media players, business applications and productivity tools
  • Endpoint security solutions: e.g., antivirus, anti-phishing, anti-malware, host-based intrusion detection and prevention systems
  • Endpoint operating systems and services: e.g., Windows, Mac, Linux

Created in-house by a dedicated team of security experts, IMPACT’s client-side exploits are tested and updated on a daily basis -- ensuring that they are current, effective and safe for your environment.

IMPACT also allows you to make sure that newly-applied security patches or device configuration alterations don’t introduce new vulnerabilities that could put your organization at risk.

Maintain Centralized Control of Distributed Endpoints

One of the most significant challenges of the continued mobilization of endpoint technology is maintaining devices’ security posture even as they are carried outside of your networks and exposed to applications and websites that your perimeter defenses have already been tuned to control. By arming your organization with the ability to perform regular tests against endpoint vulnerabilities from a centralized locale, your security team can protect against the potential for end users to mistakenly download malicious applications or visit tainted URLs in the outside world and carry out attacks on an ongoing basis to protect against threats that seek to exploit your environment from the inside out.