Menu Close

CORE - USEFUL LINKS

Home > Core Impact > Useful Links

Core Impact Training and Help

Core Security have some great content and services, most of which are available from their web site, from Core Impact Training, to Core Impact documentation, to Core Impact videos, all arranged in ways that make sense for them, not necessarily to you.

Here we bring everything Core Impact related together in one place, hopefully organised in a way that makes sense to you.

To keep you on your toes, Core have several portals:

Core Impact Support

With your subscription you get upgrades to the platform, updated exploits, and access to the Support team.

The Support team can be contacted in the following ways:

You will also find copies of useful product documents here.

Core Impact Training

There are several options available for training, ranging from formal courses, to video tutorials.

Formal Courses

Core offer a number of formal courses, some classroom led, some eLearning; many of the eLearning ones are free. The courses are described here, mixed in with all their other products: https://www.coresecurity.com/content/request-access-core-security-training-resources Customers with a valid support package or subscription, can get access to the latest Core Impact eLearning material for free.  This page explains how to register. If you are interested in any of the paid courses, please talk with your S4 account manager.

Video Tutorials

There are a number of tutorials put together by different people. As an introduction you cannot go far wrong than with the sales demo which is here: https://www.s4apps.com/core-impact/demo/

If you want more detail then the support guys put together some videos in 2017 that walk through the 4 key areas of the product.

NameCommentLink
Network AttacksShows the general process for performing a network penetration test.https://youtu.be/sG0RUg8SKRo
Web Application AttacksShows the general process for performing a web application penetration test.https://youtu.be/F42sDsbAaiQ
Client Side AttacksNote: this area of the product we heavily revised and the 2018.1 release webinar covers this area better.

Shows the general process for performing phishing attacks.
https://youtu.be/eLsERrx8wmE
WiFi AttacksShow how to use the 2 different hardware devices that are supported to perform network attacks.https://youtu.be/fQQthm26w8o

Version Release Videos

When Core release new versions of the product they sometimes release material describing the content.  Here are the most recent 2.

NameCommentLink
Release 2018.1 WebinarShows the new phishing functionality that was released in the 2018.1 release.https://youtu.be/cC1a204cDEc
Release 2018.2 WebinarLots of new features in the 2018.2 release, so much so that it gets its own page, link to the right.https://www.s4apps.com/core-impact/releases/2018-2/

Core Impact Tips And Tricks

These videos were put together by a number of different team members within Core and cover off different, more advanced areas of the product.

NameCommentLink
6 steps to running a pen testStart watching now to hear from Andy Nickel and learn the six fundamental steps of running a network penetration test.https://youtu.be/tMJo9iG5QhY
Understanding Agent TypesUnderstanding Agent Types in Core Impact: Discover the Pros + Cons

In this webinar, Matt Ducoffe will explain the usage and benefits of temporal agents to customers who traditionally like to run campaigns and make agents persistent. He will also explain the different settings and types of agents available to Impact users for best practices.
https://youtu.be/Ou2ItmqVJvI
Lazy Pen-Tester Tips and TricksDoes the thought of having to spin up single engagement items like infrastructure, domains, and certificates fill you with dread? If so, we’ve got some good news. In this webinar, we’ll show you how you can leverage Impact’s scripting capabilities to build custom setup workflows to make your engagements go more smoothly and efficiently.https://youtu.be/u725TX_hnhM
All the Phishes in the SeaTake a deeper dive into some of the key release features of Core Impact 18.1.

Additional info on Core’s site here: https://www.coresecurity.com/webinar/63070
https://youtu.be/to3YOvCgzbQ
Customizable Reports with Core ImpactLearn how to use the customizable reports functionality available in Core Impact. With this you will be able to fully customize the spreadsheet by determining what you’d like to include, or exclude, in your report. This is very handy as a way to integrate Impact results directly with the tester process and reduce the required time to integrate findings with other tools or manual testing that may occur.

Additional info on Core’s site here: https://www.coresecurity.com/webinar/62449
https://youtu.be/LoXHszC55gg
Beyond the Initial Compromisehttps://youtu.be/yKYCjC2vRLM
Restricted environmentsIn this video an experienced pen-tester will walk users though cool features and unique ways to use Core Impact during testing, such as:
  • Demonstrating how to set up DNS channels for agent communicationsDownloading and running PowerShell scripts even when compromised devices do not have internet connectivity
  • How to utilize the agentless WMI testing capabilities to make your tests even more stealthy
  • And much more
https://youtu.be/IZRLWCOQGTM
Lateral movementLateral movement and credential capturehttps://youtu.be/reYVzX410Zc
External pivot Setting up an external pivot with Core Impact.https://youtu.be/lkWxO_vu0MQ
Remote interface with Core ImpactMapping a network interface in a remote agent and setting up a VPN connectionhttps://youtu.be/ocGrhegUAes
License MoveRuns for about 1 minute but no sound. Shows a user “de-authorising” the Core Impact product and then “re-authorising” it. This is all done over the Internet (as this is what most people do) but it can be done via email / phone if needed. You will see the email & phone options in the wizards.https://youtu.be/dgVvC0A1x3k
Teaming Demo 1Teaming is where 2 or more people work on one pen-test.
The short video below shows how the Core Impact teaming functionality works. The “Teaming Server” has to be an unlimited license. The “Teaming Client” can be any size license.
https://youtu.be/R4iUyYLY5Ho
Teaming Demo 2Sometimes two heads are better than one. Learn about how Core Impact’s Teaming capabilities allow multiple pen testers to work on the same engagement and share resources, information, and control of compromised systems.https://youtu.be/fpNNMSdR8ds
PowerShell with Core ImpactAn important piece to note about Impact’s implementation of PowerShell is that it doesn’t require powershelle.exe and instead uses the .NET interfaces exposed by the operative system. Because of this, you can expect a stealthy and efficient integration that doesn’t trigger alarms.https://youtu.be/rDAev_-7xQI
Pivoting with PCAP with Core ImpactIn this quick video, we will show you how the Packet Capture (PCAP) plugin with Core Impact can be installed and used in order to quickly and efficiently improve the speed of information gathering taskshttps://youtu.be/qIqDoxS9BLw
DNS Channel & Temporal Agents with Core Impacthttps://youtu.be/TaBHCy54cmM
Better Pivoting = Better Pen Testinghttps://youtu.be/2WcaF8oLm6c
End to End Web Application Testinghttps://youtu.be/x0Ewo0phHrg
Agentless WMI Shellshttps://youtu.be/k1wrvodIPuE
Basic phishing and privilege escalation against windowshttps://youtu.be/AlIuxLjwtjw
Customising reportsA short web page describing how to customise reports.https://www.secureauth.com/blog/customizable-reports-core-impact
Privilege EscalationImpact simplifies the often time consuming process of finding the right privilege escalation exploit by using the privilege escalation RPT.https://youtu.be/uetJkwNvV7s
Workspace ManagementCore Impact features powerful capabilities to group all data and logs associated with an engagement or project together in a Workspacehttps://youtu.be/lceq5zCIaHU
Quick Information ModuleCore Impact features thousands of distinct modules. Learn how to use the Quick Information display to get access to critical information for your penetration test.https://youtu.be/CgHL1HfoNog
Metasploit IntegrationCore Impact integrates with the Metasploit Framework to give you access to Metasploit’s network exploits. Learn how to install Metasploit, configure the integration and use ithttps://youtu.be/5e_Clw-VjfY
Local Information GatheringGetting an agent on the box is just the beginning. Learn how to use Core Impact’s local information gathering capabilities to develop intelligence on users, services, and networks available from compromised machines.https://youtu.be/aSWwpqzpcYE
Connection MethodsLearn the different methods of how Core Impact’s agents can communicate, when to use them, and more.https://youtu.be/JSyiQ_UU0Uk
Identity ManagerLearn how Core Impact makes it easy to collect, store, and use user credentials and identities.https://youtu.be/NKd0JizhMHQ
Clean UpLearn how you can quickly clean up deployed agents, as well as redeploy them if necessary.https://youtu.be/_F1SkvbnZ50
Agent PackingLearn about the flexible options Core Impact provides you for packaging and using our Agent payload.https://youtu.be/OsPd91rtxB0
Attack and Penetration TestLearn the basics of using Core Impact’s Attack and Penetration Rapid Pen Test functionality to quickly assess a host or network for easy to exploit vulnerabilities with minimal setup and effort.https://youtu.be/0QRvgIQRHBc