SlideShare a Scribd company logo
1 of 8
CORE INSIGHT Enterprise Security Testing & Measurement Solution
How CORE INSIGHT Enterprise Works 1. Environment Profiling Tell INSIGHT about your environment. Step 1: Environment Profiling ,[object Object]
Import info from your network asset mgt solution or network / web scanner
Provide a range of IPs
Provide a range of web application URLs
Provide a list of end user email addresses,[object Object]
Define the scope of systems to be tested (e.g., a specific subnet).
Define which systems are in and out of bounds for the campaign

More Related Content

Viewers also liked

Sound Strategies: "If InterContinental were a sound..." | EABIS: Experientia...
Sound Strategies:  "If InterContinental were a sound..." | EABIS: Experientia...Sound Strategies:  "If InterContinental were a sound..." | EABIS: Experientia...
Sound Strategies: "If InterContinental were a sound..." | EABIS: Experientia...Michael Spencer
 
Core Insight Enterprise Overview
Core Insight Enterprise Overview Core Insight Enterprise Overview
Core Insight Enterprise Overview Nsolera
 
Persoonlijk leiderschap en hoe opleidingsinstituten omgaan met de toekomst
Persoonlijk leiderschap en hoe opleidingsinstituten omgaan met de toekomstPersoonlijk leiderschap en hoe opleidingsinstituten omgaan met de toekomst
Persoonlijk leiderschap en hoe opleidingsinstituten omgaan met de toekomstEgon Beaart
 
Blessed are the peacemakers
Blessed are the peacemakersBlessed are the peacemakers
Blessed are the peacemakersmullena7
 
Network Cabling
Network CablingNetwork Cabling
Network Cablingxinxinxin
 
Marketing and sales strategies of cabo san viejo
Marketing and sales strategies of cabo san viejoMarketing and sales strategies of cabo san viejo
Marketing and sales strategies of cabo san viejoGunjan Khurana
 

Viewers also liked (11)

Bf
BfBf
Bf
 
Sound Strategies: "If InterContinental were a sound..." | EABIS: Experientia...
Sound Strategies:  "If InterContinental were a sound..." | EABIS: Experientia...Sound Strategies:  "If InterContinental were a sound..." | EABIS: Experientia...
Sound Strategies: "If InterContinental were a sound..." | EABIS: Experientia...
 
At
AtAt
At
 
Core Insight Enterprise Overview
Core Insight Enterprise Overview Core Insight Enterprise Overview
Core Insight Enterprise Overview
 
Persoonlijk leiderschap en hoe opleidingsinstituten omgaan met de toekomst
Persoonlijk leiderschap en hoe opleidingsinstituten omgaan met de toekomstPersoonlijk leiderschap en hoe opleidingsinstituten omgaan met de toekomst
Persoonlijk leiderschap en hoe opleidingsinstituten omgaan met de toekomst
 
Blessed are the peacemakers
Blessed are the peacemakersBlessed are the peacemakers
Blessed are the peacemakers
 
Pd
PdPd
Pd
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Cabo san viejo
Cabo san viejoCabo san viejo
Cabo san viejo
 
Marketing and sales strategies of cabo san viejo
Marketing and sales strategies of cabo san viejoMarketing and sales strategies of cabo san viejo
Marketing and sales strategies of cabo san viejo
 
Em
EmEm
Em
 

Similar to Core Insight Enterprise 2min

IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET Journal
 
Penetration testing using metasploit framework
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit frameworkPawanKesharwani
 
(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration TestingBluechip Gulf IT Services
 
Accurately detecting source code of attacks that increase privilege
Accurately detecting source code of attacks that increase privilegeAccurately detecting source code of attacks that increase privilege
Accurately detecting source code of attacks that increase privilegeUltraUploader
 
The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...franco_bb
 
Creating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industryCreating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industryKeith Chapman
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tameSAT Journals
 
Data Science Task.pdf by the topper world
Data Science Task.pdf by the topper worldData Science Task.pdf by the topper world
Data Science Task.pdf by the topper worldTanishaChouhan4
 
Key AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxKey AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxsleeperfindley
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfElanusTechnologies
 
PatrOwl - Security Operations Orchestration
PatrOwl  - Security Operations OrchestrationPatrOwl  - Security Operations Orchestration
PatrOwl - Security Operations OrchestrationMaKyOtOx
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET Journal
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comamaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comamaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comamaranthbeg73
 

Similar to Core Insight Enterprise 2min (20)

Threat modelling
Threat modellingThreat modelling
Threat modelling
 
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit Framework
 
Penetration testing using metasploit framework
Penetration testing using metasploit frameworkPenetration testing using metasploit framework
Penetration testing using metasploit framework
 
(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing
 
Accurately detecting source code of attacks that increase privilege
Accurately detecting source code of attacks that increase privilegeAccurately detecting source code of attacks that increase privilege
Accurately detecting source code of attacks that increase privilege
 
The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...
 
Creating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industryCreating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industry
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tam
 
Data Science Task.pdf by the topper world
Data Science Task.pdf by the topper worldData Science Task.pdf by the topper world
Data Science Task.pdf by the topper world
 
Key AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxKey AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docx
 
penetration test
penetration testpenetration test
penetration test
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
 
Saying Hello to Bug Bounty
Saying Hello to Bug BountySaying Hello to Bug Bounty
Saying Hello to Bug Bounty
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdf
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
PatrOwl - Security Operations Orchestration
PatrOwl  - Security Operations OrchestrationPatrOwl  - Security Operations Orchestration
PatrOwl - Security Operations Orchestration
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 

Core Insight Enterprise 2min

  • 1. CORE INSIGHT Enterprise Security Testing & Measurement Solution
  • 2.
  • 3. Import info from your network asset mgt solution or network / web scanner
  • 5. Provide a range of web application URLs
  • 6.
  • 7. Define the scope of systems to be tested (e.g., a specific subnet).
  • 8. Define which systems are in and out of bounds for the campaign
  • 9. Optionally, delegate campaigns to IT staff who own the systems, web app developers, etc.
  • 10. Establish the campaign schedule (e.g., once, daily, weekly, etc.).2. Campaign Definition You define critical IT assets (aka goals), scope and timing. GOAL
  • 11.
  • 12. INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.
  • 13. INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.2. Campaign Definition You define critical IT assets (aka goals), scope and timing. GOAL 3. Attack Path Calculation INSIGHT calculates likely attack paths to your defined assets.
  • 14.
  • 15. Can target web applications, network systems, endpoint systems and end users (via phishing).
  • 16. All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.
  • 17. Product receives 20-30 new exploits and other modules per month.2. Campaign Definition You define critical IT assets (aka goals), scope and timing. GOAL 3. Attack Path Calculation INSIGHT calculates likely attack paths to your defined assets. 4. Attack Replication INSIGHT attempts to exploit vulnerabilities along the paths.
  • 18.
  • 19. Stays “in bounds” as defined in the campaign.
  • 20. Only tests calculated attack paths
  • 22. Stealthy attacker behavior2. Campaign Definition You define critical IT assets (aka goals), scope and timing. GOAL 3. Attack Path Calculation INSIGHT calculates likely attack paths to your defined assets. 5. Adaptive Path Adjustment INSIGHT seeks new paths as systems are compromised. 4. Attack Replication INSIGHT attempts to exploit vulnerabilities along the paths.
  • 23.
  • 24. Ensures that security tests keep up with your changing environment2. Campaign Definition You define critical IT assets (aka goals), scope and timing. GOAL 3. Attack Path Calculation INSIGHT calculates likely attack paths to your defined assets. 6. Infrastructure Change Campaigns can automatically adapt as you deploy new systems. 5. Adaptive Path Adjustment INSIGHT seeks new paths as systems are compromised. New system added to environment! 4. Attack Replication INSIGHT attempts to exploit vulnerabilities along the paths.
  • 25.
  • 26. Shows where defenses stop attacks.
  • 27. Reveals exposures to attacks that combine different techniques and vectors.
  • 28. Details attack paths and penetration points for remediation planning.2. Campaign Definition You define critical IT assets (aka goals), scope and timing. 7. Dashboard / Reporting INSIGHT presents findings in terms relevant to your organization. 3. Attack Path Calculation INSIGHT calculates likely attack paths to your defined assets. 6. Infrastructure Change Campaigns can automatically adapt as you deploy new systems. 5. Adaptive Path Adjustment INSIGHT seeks new paths as systems are compromised. 4. Attack Replication INSIGHT attempts to exploit vulnerabilities along the paths.

Editor's Notes

  1. Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  2. Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  3. Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  4. Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  5. Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  6. Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  7. Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.