Network Vulnerability Scanner Released by Core Security
Software allows administrators to use publicly available exploit codes to verify attackers.
Core Security Technologies has released Core Impact Pro version 11. As reported on PC World, this version offers the tools and exploits to break into a device and the software will allow the administrator, using publicly available exploit code, to verify that a malicious attacker could access the device, rename it, crack its list of passwords and monitor its activities. Although there are several network vulnerability scanners available, Core is hoping that its capabilities in application penetration testing will provide additional insight into possible vulnerabilities on a network or in systems.
"'Network security devices can be areas of vulnerability exposure if not properly configured, managed and patched,' said Diana Kelley principal analyst at analysis firm SecurityCurve, in a statement. 'That's why a robust penetration testing plan includes these assets. Organizations need to understand if network device vulnerabilities exist and if these vulnerabilities can lead to data theft or other forms of compromise.'"