Core - Useful links


Core - Useful Links

Core have some great content and services, most of which are available from their web site, all arranged in ways that make sense for them, not necessarily to you.

Here we bring everything Core Impact related together in one place, hopefully organised in a way that makes sense to you.

To keep you on your toes, Core have several portals:

Technical Support

With your subscription you get upgrades to the platform, updated exploits, and access to the Support team.


The Support team can be contacted in the following ways:


Core are building out a community web site for users to share content that they have generated amongst themselves based on GIT. It is also a place where Core share content that they have generated outside of the development process e.g. things put together by the consulting team.


You can get to the community here:


There are several options available for training, ranging from formal courses, to video tutorials.

Formal Courses

Core offer a number of formal courses, some classroom led, most are eLearning. Of the eLearning ones, most are free. The courses are described here:


Core have just started to offer the CICP course for free to customers.  Register here:


If you want to have access to the eLearning courses login here: and navigate to the training tab. You can enrol in the free courses at will.


If you are interested in any of the paid courses, please talk with your S4 account manager.

Video Tutorials

There are a number of tutorials put together by different people. As an introduction you cannot go far wrong than with the sales demo which is here:

If you want more detail then the support guys put together some videos in 2017 that walk through the 4 key areas of the product.

Network AttacksShows the general process for performing a network penetration test.
Web Application AttacksShows the general process for performing a web application penetration test.
Client Side AttacksNote: this area of the product we heavily revised and the 2018.1 release webinar covers this area better.

Shows the general process for performing phishing attacks.
WiFi AttacksShow how to use the 2 different hardware devices that are supported to perform network attacks.

Version Release Videos

When Core release new versions of the product they sometimes release material describing the content.

Release 2018.1 WebinarShows the new phishing functionality that was released in the 2018.1 release.

Tips and Tricks Videos

These videos were put together by a number of different team members within Core and cover off different, more advanced areas of the product.

6 steps to running a pen testStart watching now to hear from Andy Nickel and learn the six fundamental steps of running a network penetration test.
Understanding Agent TypesUnderstanding Agent Types in Core Impact: Discover the Pros + Cons

In this webinar, Matt Ducoffe will explain the usage and benefits of temporal agents to customers who traditionally like to run campaigns and make agents persistent. He will also explain the different settings and types of agents available to Impact users for best practices.
Lazy Pen-Tester Tips and TricksDoes the thought of having to spin up single engagement items like infrastructure, domains, and certificates fill you with dread? If so, we've got some good news. In this webinar, we'll show you how you can leverage Impact's scripting capabilities to build custom setup workflows to make your engagements go more smoothly and efficiently.
All the Phishes in the SeaTake a deeper dive into some of the key release features of Core Impact 18.1.

Additional info on Core's site here:
Customizable Reports with Core ImpactLearn how to use the customizable reports functionality available in Core Impact. With this you will be able to fully customize the spreadsheet by determining what you'd like to include, or exclude, in your report. This is very handy as a way to integrate Impact results directly with the tester process and reduce the required time to integrate findings with other tools or manual testing that may occur.

Additional info on Core's site here:
Beyond the Initial Compromise
Restricted environmentsIn this video an experienced pen-tester will walk users though cool features and unique ways to use Core Impact during testing, such as:
  • Demonstrating how to set up DNS channels for agent communicationsDownloading and running PowerShell scripts even when compromised devices do not have internet connectivity
  • How to utilize the agentless WMI testing capabilities to make your tests even more stealthy
  • And much more
Lateral movementLateral movement and credential capture
External pivot Setting up an external pivot with Core Impact.
Remote interface with Core ImpactMapping a network interface in a remote agent and setting up a VPN connection
License MoveRuns for about 1 minute but no sound. Shows a user "de-authorising" the Core Impact product and then "re-authorising" it. This is all done over the Internet (as this is what most people do) but it can be done via email / phone if needed. You will see the email & phone options in the wizards.
Teaming DemoTeaming is where 2 or more people work on one pen-test.
The short video below shows how the Core Impact teaming functionality works. The "Teaming Server" has to be an unlimited license. The "Teaming Client" can be any size license.