Wednesday, September 7, 2011

How CORE IMPACT Pro Penetration Testing Works

The CORE IMPACT Pro Rapid Penetration Testing (RPT) methodology streamlines testing of servers, desktop systems, end users systems, web applications, wireless networks, and network devices by automating tasks that would traditionally require significant time, effort and expertise to perform.

The RPT automates the accepted best practice for performing penetration tests through six key steps:

For additional information, click on the steps in the diagram below.


IMPACT provides integrated Rapid Penetration Testing capabilities across five attack categories

Network Rapid Penetration Testing: replicates the actions of an attacker launching remote exploits on your network
Client-Side Rapid Penetration Testing: replicates phishing, spear phishing, spam and other social engineering attacks against end users
Web Application Rapid Penetration Testing: replicates SQL injection and remote file inclusion attacks against e-commerce, customer self-service, ERP and other web applications
Wireless Network Rapid Penetration Testing: replicates attempts at discovering Wi-Fi access points, cracking encryption keys, and joining exposed networks
Network Device Penetration Testing: replicates attempts to access networks and intercept data by detecting and exploiting network router and switch vulnerabilities
The five test approaches differ in the Information Gathering and Attack and Penetration stages, as outlined below. The remaining steps of the Rapid Penetration Test are the same once network access is achieved.

Each step is automated using easy-to-use wizards that simplify testing for new users and allow advanced users to efficiently execute common tasks. Advanced users can also manually run specific product modules to further customize the penetration testing process.

More information about Core impact can be found here.

MORE HACKS: Hack software, internet hacking, Network hacking

No comments:

Post a Comment