The Wayback Machine - https://web.archive.org/web/20110708193030/http://www.coresecurity.com/content/how-it-works
info@coresecurity.com | +1.617.399.6980   Core Blog Twitter LinkedIn
Products & Services

How CORE IMPACT Pro Penetration Testing Works

The CORE IMPACT Pro Rapid Penetration Testing (RPT) methodology streamlines testing of servers, desktop systems, end users systems, web applications, wireless networks, and network devices by automating tasks that would traditionally require significant time, effort and expertise to perform.

The RPT automates the accepted best practice for performing penetration tests through six key steps:

For additional information, click on the steps in the diagram below.


IMPACT provides integrated Rapid Penetration Testing capabilities across five attack categories

  • Network Rapid Penetration Testing: replicates the actions of an attacker launching remote exploits on your network
  • Client-Side Rapid Penetration Testing: replicates phishing, spear phishing, spam and other social engineering attacks against end users
  • Web Application Rapid Penetration Testing: replicates SQL injection and remote file inclusion attacks against e-commerce, customer self-service, ERP and other web applications
  • Wireless Network Rapid Penetration Testing: replicates attempts at discovering Wi-Fi access points, cracking encryption keys, and joining exposed networks
  • Network Device Penetration Testing: replicates attempts to access networks and intercept data by detecting and exploiting network router and switch vulnerabilities

The five test approaches differ in the Information Gathering and Attack and Penetration stages, as outlined below. The remaining steps of the Rapid Penetration Test are the same once network access is achieved.

Each step is automated using easy-to-use wizards that simplify testing for new users and allow advanced users to efficiently execute common tasks. Advanced users can also manually run specific product modules to further customize the penetration testing process.

Information Gathering

Network Rapid Penetration Testing

The Information Gathering step collects data about the targeted network, typically using Network Discovery, Port Scanner, and OS and Service Identification modules. Alternately, you can complete this step by importing information from your network mapping tool or vulnerability scanner. Access to a vulnerability scanner is not required to use IMPACT.


Key Capabilities

  • Identify the operating system and services running on targeted machines
  • Control the IP ranges you want to scan
  • Select from a variety of network discovery and port scanning methods, including TCP Connect, Fast SYN and ICMP

Client-Side Rapid Penetration Testing

In the case of end-user testing, Information Gathering involves the collection of email addresses to target with phishing, spear phishing or other social engineering attacks. IMPACT offers a number of modules for gathering email addresses of individuals in your organization, or you can enter or import your own list of email addresses to test.


Key Capabilities

  • Crawl a website to harvest addresses published on the site
  • Leverage major search engines to locate addresses for a given domain
  • Find addresses in PGP and Whois databases
  • Scan a domain for documents and scrape useful information from them, such as email addresses

Web Application Rapid Penetration Testing

During this phase of the Web Application Rapid Penetration Test, IMPACT crawls through web pages and identifies pages to test. Alternately, you can import the results from popular web application vulnerability scanners and validate imported vulnerabilities for exploitability.


Key Capabilities

  • Specify a domain or range of web pages to crawl
  • Set a link depth limit for the crawler
  • Select whether to follow links outside the specified site
  • Crawl JavaScript to discover and assess dynamically generated pages
  • Establish the browser type and version to use
  • Supply any login information required to emulate an attack from someone with access rights to the web application
  • Import web scanner results for vulnerability validation

Wireless Rapid Penetration Testing

IMPACT Pro’s discovery capabilities allow users to identify both authorized networks and unauthorized points of access. It then profiles any networks discovered by analyzing signal and packet data to measure network strength, determine security protocols, and identify devices interacting with the involved network.


Key Capabilities

  • Discover both known and unauthorized Wi-Fi networks and access points
  • Gather MAC addresses and SSIDs from beaconing machines
  • Impersonate access points, and fingerprint / harvest information from systems that connect
  • Gather information on network strength, security protocols and connected devices
  • Sniff traffic for streams of sensitive data

Network Device Rapid Penetration Testing

IMPACT Pro’s locates network devices as part Network Rapid Penetration Testing. If IMPACT discerns the operating system of a target and confirms it to be a network device, it will attempt to collect information about the device. Alternately, IMPACT includes a Passive CDP network discovery module that listens for broadcasts from Cisco devices.

Key Capabilities

  • Fingerprint found devices to determine manufacturer, device model/type, and operating system details
  • Determine the inputs on which the device accepts connections or instructions, including SNMP, Telnet, HTTP, etc.


Back to top

Attack and Penetration

Network Rapid Penetration Testing

During Attack and Penetration, CORE IMPACT Pro automatically selects and launches remote attacks leveraging IP, OS, architecture, port and service information obtained in the Information Gathering step. You can choose to launch every potential attack against each target computer, or you can have the system stop once it successfully deploys a single Network Agent, which carries the attack payload. You maintain full control over which computers are attacked and the order in which exploits are launched. In addition, you can further simplify and speed tests by excluding exploits that may leave a target service unavailable or take a long time to run.


Key Capabilities

  • Launch multiple, simultaneous attacks to speed the penetration testing process
  • Interact with compromised machines via discrete Agents that are installed only in system memory
  • Run local exploits to attack machines internally, rather than from across the network
  • Maintain control over which exploits are applied

Client-Side Rapid Penetration Testing

In the Attack and Penetration stage of the Client-Side Rapid Penetration Test, you create an email, associate it with an exploit, and go phishing. The product includes sample email templates that mimic common phishing attacks. You can also create your own custom spear phishing emails that leverage inside knowledge of your organization. IMPACT’s extensive library of client-side exploits includes attacks that target endpoint applications, endpoint security solutions, and endpoint operating systems and services. The product also takes care of sending the email, giving you options such as selecting an SMTP server or spoofing a specific “from” email address.


Key Capabilities

  • Create phishing, spear phishing and spam emails from a variety of pre-built templates
  • Safely deploy Agents using real-world malware attacks to test end-user system security
  • Track who responds to attacks and measure the effectiveness of security awareness programs – with or without exploiting their systems
  • Assess data leakage risks by luring users to complete imposter web forms
  • Demonstrate the consequences of a end-user security breach by interacting with compromised workstations

Web Application Rapid Penetration Testing

 

CORE IMPACT Pro enables you to test web applications for Persistent Cross-Site Scripting (XSS), Reflective XSS (both for static HTML and Adobe Flash® objects), Remote File Inclusion for PHP applications, SQL Injection, and Blind SQL Injection. IMPACT then dynamically creates exploits to prove whether the vulnerabilities pose actual threats. If an exploit is successful, IMPACT establishes an Agent that allows you to take a number of actions to reveal at-risk information assets.


Key Capabilities

  • Analyze custom, customized and out-of-the-box web applications for security weaknesses
  • Validate security exposures using dynamically generated exploits, emulating a hacker trying various attack paths and methods
  • Guess application usernames and passwords with dictionary attacks
  • Leverage Web Application Firewall (WAF) evasion capabilities
  • Demonstrate the consequences of an attack by interacting with web server file systems and databases through command shells and database consoles
  • Perform penetration tests without corrupting web applications or running code on targeted servers

Wireless Rapid Penetration Testing

CORE IMPACT Pro determines keys by taking advantage of known vulnerabilities in WEP-secured networks. The solution also assesses networks secured by WPA and WPA2 (using a Pre-Shared Key) via dictionary attacks that leverage information from sniffed authentication attempts. Finally, IMPACT enables you to intercept wireless transmissions and conduct Man-in-the-Middle attacks.


Key Capabilities

  • Replicate attacks against WEP, WPA and WPA2-encrypted networks
  • Conduct Man-in-the-Middle attacks, intercept wireless transmissions, and insert exploits into relayed traffic
  • Impersonate access points to connect with beaconing systems and test them against remote exploits

Network Device Rapid Penetration Testing

IMPACT Pro uses dictionary attacks to guess passwords and gain access to network devices. Once the device is compromised, IMPACT offers various modules to demonstrate the ramifications of the breach.

Key Capabilities:

  • Launch dictionary attacks to gain device access
  • Retrieve the configuration file of a compromised device and try to crack passwords that are in use
  • Rename compromised devices
  • Demonstrate how attackers could intercept copies of data packets via interface monitoring
Use Access List Piercing on routers, opening access to previously isolated networks


Back to top

At this point in Client-Side and Web Application* Rapid Penetration Tests, you can deploy a Network Agent on the compromised end-user system/web server. In Wireless and Network Device Rapid Penetration Tests, you could begin a Network RPT against systems revealed by the compromised wireless network or network device. This pivoting capability enables you to replicate sustained, real-world attacks that attempt to traverse paths of vulnerabilities throughout your environment.

*Applies to Microsoft SQL and Oracle servers compromised via SQL injection and web servers compromised via remote file inclusion for PHP.

Local Information Gathering

The Local Information Gathering step collects information about computers that have IMPACT agents deployed on them. During this step, you leverage Network Agents to interact with compromised computers and gather previously unavailable information about the OS, privileges, users and installed applications. CORE IMPACT Pro can collect information from all deployed Agents or only from those that you specify.

Key Capabilities

  • Browse file structures and view file contents on compromised machines
  • View rights obtained on compromised machines
  • Interact with compromised machines via command shells
  • Demonstrate the consequences of security breaches by replicating the steps an attacker would take after gaining access to a system


Back to top

Privilege Escalation

During the Privilege Escalation step, CORE IMPACT Pro attempts to penetrate deeper into a compromised computer by running local exploits in an attempt to obtain administrative privileges. After Privilege Escalation, you can shift the source Agent to one of the newly compromised systems and cycle back to the initial Information Gathering step, thereby establishing a beachhead from which to run attacks deeper into the network.

Key Capabilities

  • Run local exploits to attack systems internally, rather than from across the network
  • Gain administrative privileges on compromised systems
  • View the networks to which a compromised computer is connected
  • Launch attacks from any compromised system to other computers on the same network, gaining access to systems with increasing levels of security


Back to top

Cleanup

The Cleanup step automatically uninstalls every connected Agent. Agents are uninstalled in post order to support complex Agent chains. In addition, all Agents are automatically uninstalled when closing the active workspace, regardless of whether the Cleanup step is executed or not.

Key Capabilities

  • Run penetration tests without installing modules or tools on compromised systems (or altering them
    in any way)
  • Quickly and easily remove all Agents from compromised machines, leaving your network and end-user systems in their original states


Back to top

Penetration Testing Report Generation

CORE IMPACT Pro generates clear, informative reports that provide data about targeted systems and applications, results of end-user penetration tests, audits of all exploits performed, and details about proven vulnerabilities. You can view and print reports using Crystal Reports or export them in popular formats such as HTML, PDF and Microsoft Word.

Key Capabilities

  • Obtain actionable information about exploited vulnerabilities, compromised end-user systems, web application weaknesses and associated risks
  • Create activity audits to satisfy compliance and regulatory requirements
  • Export report content in popular formats that can be easily customized and shared


Back to top

SHARE