Reveal Implications of Application Vulnerabilities
Core WebVerify offers powerful infrastructure and end-user testing capabilities that enable you to demonstrate how an attacker could proceed after compromising the web application.
Post-Exploitation Capabilities for Infrastructure Security Testing
- Assess the security of the underlying web and database servers against remote exploits targeting OS, services and system application weaknesses.
- Determine whether an attacker could gain administrative privileges on the web server via privilege escalation techniques.
- Pivot from the web server to a backend system, proving whether an initial application compromise would open the door to a breach of the internal network.
- Get remediation information about available patches and other necessary security updates.
Post-Exploitation Capabilities for End-User & Endpoint Security Testing
- Validate XSS exposures by crafting and emailing URLs that exploit XSS vulnerabilities.
- Assess employee security awareness by leveraging email addresses found in exposed databases in real-world phishing attacks.
- Leverage email templates for common types of phishing attacks, or create custom spear phishing emails.
- Identify exploitable OS, services and application vulnerabilities on endpoint machines compromised by XSS and phishing attacks.
- Trace email clickthroughs and data leakage through web forms.













