Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


CORE Security Adds Password Cracking and Team Testing to Latest Version of CORE Impact Pro

CORE Security®, a leading provider of predictive security intelligence solutions, today announced the release of CORE Impact® Pro 2013, the latest version of its vulnerability assessment and penetration testing software, that allows organizations to proactively test IT infrastructure and identify exactly where and how an organization’s critical data can be breached.

CORE Impact Pro 2013 adds several new capabilities. These advanced capabilities include CloudCypher, an online service created and managed by CORE that works with Windows® hashed passwords discovered by Impact during testing and attempts to determine plaintext passwords for those hashes. These obtained passwords can then be used for additional security testing. Other highlights of the release include the ability to team multiple security testers together to interact in the same workspace against the same target environment across multiple copies of Impact. In addition to these new features, Impact 2013 is supported by the company’s extensive library of more than 2,800 commercial-grade exploits and other attack techniques.

In addition to CloudCypher, and Teaming, CORE Impact 2013 new capabilities include:

  • Network Remediation Validation
  • DNS Communication Channel
  • Agent Redeploy
  • Network IG & AP Module output
  • Reporting enhancements

CORE Impact 2013’s Network Remediation Validation Wizard is a quick retest option used for previously identified network risks that confirm the risks have been remediated appropriately and the vulnerability management cycle is closed. This feature allows a closed loop capability for the testing process. This new release of Impact has added the ability to communicate using the DNS protocol to agents deployed using a specific set of modules. As security around TCP and HTTP protocols has improved, hackers have looked at alternative data protocols to infiltrate, adding the DNS capability allows testers to use the DNS channel as well. Agent Redeploy is a new feature that allows Impact to quickly verify whether a previously discovered vulnerability has been remediated.

CORE Impact now displays rich progress information as the automated pen tests execute against target networks, allowing a user to track progress. Using this feature, Impact can now demonstrate in a user-friendly and graphical manner, exactly what is being executed in real-time. The last new addition for Impact 2013 is report selection for reporting on specific hosts needed, rather than having to run the report on all hosts within the workspace. Reports that support this capability include:

  • PCI Vulnerability Validation Report
  • Vulnerability Validation Report
  • Host Report
  • Host Based Activity Report
  • Vulnerability Report
  • Wellness Report

“CloudCypher was originally developed by our internal pen- testing team to allow them to manage passwords more easily as part of a testing engagement. Adding this pen testers’ tool, used for nearly ten years of testing by the team, to our next version of Impact brings huge value to our user community. This advanced capability that we’ll offer as a cloud service going forward is another example of the unique features that CORE, as a multi-discipline company, can bring to this market,” said Milan Shah, senior vice president of Products and Engineering at CORE Security. “The teaming, DNS communications capabilities, and reporting enhancements are features that our users suggested to us, and we’re pleased to be able to add these feature requests to our market-leading product.”

More about CORE Impact Pro:

CORE Impact® Pro is the most comprehensive software solution for assessing the real-world security of web applications, network systems, endpoint systems, email users, mobile devices, wireless networks, and network devices. Backed by CORE Security’s ongoing vulnerability research, Impact Pro allows users to take security testing to the next level by safely replicating a broad range of data breach threats. As a result, testers can identify exactly where and how your organization’s critical data can be breached. Learn more about CORE Impact Pro penetration testing software at www.coresecurity.com/Impact.

About CORE Security

CORE Security is the leading provider of predictive security intelligence solutions for enterprises and government organizations. We help more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CORE Labs, the company’s innovative security research center. For more information, visit www.coresecurity.com.

CORE Security, CORE Impact, CORE Impact Professional, CORE Secured, and CORE Labs are registered trademarks and/ or trademarks of CORE SDI, Inc. in the United States and/or other countries. All other products and services are trademarks of their respective owners.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
The IoT has the potential to transform the world, bringing new functions and efficiency to big problems such as disease, poverty, traffic, and government transparence. It also makes for a nice Christmas gift for “kids in science fair projects.” This latter point was made by Broadcom an...
Everything from jet engines to refrigerators is joining the Internet of Things, pushing networks to the brink. In a new Boeing 747, almost every part of the plane is connected to the Internet, recording and, in some cases, sending continuous streams of data about its status. General El...
The Internet of Things (IoT) is getting personal. Wearables, ingestables, even implantables – devices that not only help us with our fitness, but can monitor and manage disease and its treatment – are right around the corner. And where the IoT goes, money follows. In this case, Big Pha...
When we talk about the impact of BYOD and BYOA and the Internet of Things, we often focus on the impact on data center architectures. That's because there will be an increasing need for authentication, for access control, for security, for application delivery as the number of potentia...
Google has created what it calls a “Matrix-style,” virtual version of California’s road system that it’s been using to test self-driving cars before sending them out onto the actual road, according to the Guardian. Google is apparently so thrilled with its simulation that it asked Cali...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE