The Wayback Machine - https://web.archive.org/web/20111020075445/http://www.coresecurity.com/content/reveal-implications-application-vulnerabilities
info@coresecurity.com | +1.617.399.6980   Core Blog Core Blog Twitter LinkedIn
Products
SHARE

Reveal Implications of Application Vulnerabilities

Core WebVerify offers powerful infrastructure and end-user testing capabilities that enable you to demonstrate how an attacker could proceed after compromising the web application.

Post-Exploitation Capabilities for Infrastructure Security Testing

  • Assess the security of the underlying web and database servers against remote exploits targeting OS, services and system application weaknesses.
  • Determine whether an attacker could gain administrative privileges on the web server via privilege escalation techniques.
  • Pivot from the web server to a backend system, proving whether an initial application compromise would open the door to a breach of the internal network.
  • Get remediation information about available patches and other necessary security updates.

Post-Exploitation Capabilities for End-User & Endpoint Security Testing

  • Validate XSS exposures by crafting and emailing URLs that exploit XSS vulnerabilities.
  • Assess employee security awareness by leveraging email addresses found in exposed databases in real-world phishing attacks.
  • Leverage email templates for common types of phishing attacks, or create custom spear phishing emails.
  • Identify exploitable OS, services and application vulnerabilities on endpoint machines compromised by XSS and phishing attacks.
  • Trace email clickthroughs and data leakage through web forms.