Core Impact

This topic contains 5 replies, has 5 voices, and was last updated by  Dengar13 9 years, 7 months ago.

  • Author
    Posts
  • #4900
     Dengar13 
    Participant

    Does anyone else have this?  If so, what are your pros/cons?

    I think it does a pretty good job at web app pen testing, but have found that Paros, w3af, and others find some vulnerabilities/items of interest that it doesn’t.  I also find that Wikto finds directories that Core doesn’t.

    An external network pen test is OK, but haven’t found another tool better.  Some of the OS fingerprinting is a little off and sometimes it cannot detect one at all.

    Client-side is really good and have found a TON of corporate emails that I can use to leverage an attack.

    One thing I find in an internal test is that Symantec Endpoint Protection goes berserk on the host that I am testing against.  I guess that is a good thing though, but not for for me when I am testing.

    Just was wondering what everyone else’s opinion was.

  • #30868
     pizza1337 
    Participant

    its a hard tool to get your hands on(at least for me), me and my friend asked for trial, none of us ever got it, or any respond from them.

  • #30869
     dynamik 
    Participant

    @pizza1337 wrote:

    its a hard tool to get your hands on(at least for me), me and my friend asked for trial, none of us ever got it, or any respond from them.

    If I remember correctly, you get access to that with Offensive Security’s PWB (OSCP) course. I’m not sure if that’s still included after the revision though.

  • #30870
     Kev 
    Participant

    I have used Core a lot to test vulnerabilties if I am attacking the network internally. It does a great job and is an asset to a pentester’s tool box. However, if I am attacking from the “outside” I find its way too noisy. I hate getting shut down or alerting anyone of my attack early on, although sometimes I am amazed how asleep at the wheel some folks can be!

    I still follow the concept of attacking a network the way a hacker would. Most black hats that I have been aware of dont have access to tools like Core and use more simple and stealth techniques. Thats been my experience.

  • #30871
     Ketchup 
    Participant

    I know that it does a great job pivoting through a compromised host.  I haven’t used it in a while, but I would agree with Kev, in that it’s noisy.

  • #30872
     Dengar13 
    Participant

    Yes, it does a wonderful job pivoting through a compromised host and is very, very noisy.  Another thing that they could do better is the reporting.  If I were scanning for PCI compliance would want that reporting option, especially for the price you pay for it.

    I feel you, Pizza.  I was in the same boat years ago when I was looking for a vulnerability scanner.  If they sniff the fact that you are hesitant or  think you don’t have the funding for it, they won’t bother with you.  At least that was my perception and that was back in ’05.

You must be logged in to reply to this topic.

Copyright ©2019 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?