Top Banner
TM 123-45-6789 Core Impact Pro for Wireless Network Testing Gauge Your Organization’s Exposure to Wi-Fi Threats Core Impact® Pro’s wireless penetraon tesng capabilies enable you to assess your organizaon’s readiness against real-world aacks originang over Wi-Fi networks. With Core Impact, you proacvely replicate the acons of a would-be aacker to reveal exploitable weaknesses in your wireless and backend networks – gaining aconable data at each step for efficient and effecve risk migaon. Wireless penetraon tesng capabilies in Core Impact Pro include: Discovery of both known and unauthorized Wi-Fi networks and access points Idenficaon of devices interacng with the network Informaon gathering on network strength, security protocols and connected devices Aack and penetraon of networks encrypted with WEP, WPA-PSK and WPA2-PSK Man-in-the-Middle (MITM) aack replicaon Wi-Fi Pineapple Mark V Support for FakeAP Beaconing machine detecon SSID impersonaon Automated traffic sniffing for finding streams of sensive data Capabilies for joining cracked networks and tesng backend systems Comprehensive reporng of wireless tesng acvies and findings Seamless pivong between wireless, network, web applicaon and endpoint tests, Gain Actionable Information for Improving Wireless Security and Protecting Backend Resources Pinpoint exploitable Wi-Fi weaknesses that extend beyond the walls of your organizaon Idenfy unauthorized networks Replicate the steps an aacker would take aſter gaining entry to the network Exploit OS, service and applicaon vulnerabilies in backend system connected to exposed networks Idenfy sensive data, escalate privileges, and determine the true implicaons of a breach Harvest email addresses from exposed systems for use in Core Impact phishing tests Gain access to backend web applicaons and pivot to Impact web applicaon tesng Generate reports for efficient remediaon and maintain audit trails for compliance iniaves Benchmark and measure changes in your security posture over me System Vulnerabilies Exploited IMPACT Agents Deployed Data Gathered Network Idenfied Encrypon Cracked Network Joined Core Impact Pro allows you to replicate mulstaged aacks that leverage compromised systems to target backend resources, revealing how chains of exploitable vulnerabilies can open paths to mission-crical systems and data. Impact Pro provides aconable data regarding: where crical exposures exist what systems and data are at risk what steps are necessary for remediaon
2

Core Impact Pro for Wireless Network Testing · Wireless penetration testing capabilities in Core Impact Pro include: • Discovery of both known and unauthorized Wi-Fi networks and

Aug 27, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Core Impact Pro for Wireless Network Testing · Wireless penetration testing capabilities in Core Impact Pro include: • Discovery of both known and unauthorized Wi-Fi networks and

TM

123-45-6789

Core Impact Pro for Wireless Network Testing

Gauge Your Organization’s Exposure to Wi-Fi Threats

Core Impact® Pro’s wireless penetration testing capabilities enable you to assess your organization’s readiness against real-world attacks originating over Wi-Fi networks. With Core Impact, you proactively replicate the actions of a would-be attacker to reveal exploitable weaknesses in your wireless and backend networks – gaining actionable data at each step for efficient and effective risk mitigation.

Wireless penetration testing capabilities in Core Impact Pro include:

• Discovery of both known and unauthorized Wi-Fi networks and access points

• Identification of devices interacting with the network

• Information gathering on network strength, security protocols and connected devices

• Attack and penetration of networks encrypted with WEP, WPA-PSK and WPA2-PSK

• Man-in-the-Middle (MITM) attack replication

• Wi-Fi Pineapple Mark V Support for FakeAP

• Beaconing machine detection

• SSID impersonation

• Automated traffic sniffing for finding streams of sensitive data

• Capabilities for joining cracked networks and testing backend systems

• Comprehensive reporting of wireless testing activities and findings

• Seamless pivoting between wireless, network, web application and endpoint tests,

Gain Actionable Information for Improving Wireless Security and Protecting Backend Resources

• Pinpoint exploitable Wi-Fi weaknesses that extend beyond the walls of your organization

• Identify unauthorized networks

• Replicate the steps an attacker would take after gaining entry to the network

• Exploit OS, service and application vulnerabilities in backend system connected to exposed networks

• Identify sensitive data, escalate privileges, and determine the true implications of a breach

• Harvest email addresses from exposed systems for use in Core Impact phishing tests

• Gain access to backend web applications and pivot to Impact web application testing

• Generate reports for efficient remediation and maintain audit trails for compliance initiatives

• Benchmark and measure changes in your security posture over time

System Vulnerabilities Exploited IMPACT Agents Deployed Data Gathered

Network Identified Encryption Cracked Network Joined

Core Impact Pro allows you to replicate multistaged attacks that leverage compromised systems to target backend resources, revealing how chains of exploitable vulnerabilities can open paths to mission-critical systems and data.

Impact Pro provides actionable data regarding: • where critical exposures exist • what systems and data are at risk • what steps are necessary for remediation

Page 2: Core Impact Pro for Wireless Network Testing · Wireless penetration testing capabilities in Core Impact Pro include: • Discovery of both known and unauthorized Wi-Fi networks and

TM

Identify Known and Unauthorized Wireless Networks

any networks discovered by analyzing signal and packet data to measure network strength, determine

Crack WPA, WPA2 and WEP Encryption

Replicate Man-in-the-Middle (MITM) Attacks

Wi-Fi Pineapple Mark Support for Fake AP

Pro adds support for Wi-Fi Pineapple Mark V devices, taking advantage of this device’s hardware

allowing you to run MiTM modules (e.g. the Android WebView addJavascriptInterface() exploit).

Detect Beaconing Machines

previously been connected to and will connect to an access point without the user’s involvement.

(network name) for which it is probing.

Impersonate SSIDs

Trace Attack Paths to Backend Sytems and Data

Wireless use has exploded

have found many vulnerable WLANs to exploit. Enterprises need to make sure their vulnerability assessment processes incorporate WLAN technologies into both

- John Pescatore

Next Steps

Core Impact Pro allows

security of network systems,

systems, email users, mobile devices and wireless networks. Learn more by

requires the use of an AirPcap TX Wireless Packet Capture Adapter from CACE Technologies. A discount is available for Core Impact customers.

Local Region Contact

E-SPIN Group of Companies (Business Centre strategic presence across the region)E-SPIN SDN. BHD. (714753-U) (GST No: 001328111616)E-SPIN INTERNATIONAL LIMITED 億轉國際有限公司 (1970945)E-SPIN INTERNATIONAL PTE. LTD. (201312412W)

© 2014 Core Security Technologies & Core Insight are trademarks of Core SDI, Inc. All other brands

E-SPIN provides Core Security’s full range of products and technologies as part of the company’s vulnerability management, IT security audit, penetration testing and ethical hacking portfolio. In addition, E-SPIN provides consulting, training, and maintenance services for Core Security’s products for channel partner, multi-national corporations, public listed enterprises, federal and state government, cyber security, military and reseller customers throughout Asia Paci�c regions.See more at: http://www.e-spincorp.com email [email protected]