Skip to content

Core Impact with Cobalt Strike

Penetration Testing and Red Teaming software.

Using Core Impact & Cobalt Strike together demo

Fortra, one of the world’s leading security tool vendors owns a number of offensive security tools. These tools are all leaders in their respective product categories. The tools have always integrated with other vendor’s tools, which will continue, but the integrations between the Fortra owned tools can be much closer, because one vendor controls them.

Below are two demos showing the current integration points. 

These integrations will continue to be enhanced as newer versions are released.

1. Session Passing from Core Impact to Cobalt Strike - 4 minutes

2. Using Cobalt to install Impact agent and tunnel traffic - 24 minutes

Core Impact 20.3 Demonstration and Tutorial for Cobalt Strike users [HQ]

Session Passing from Core Impact to Cobalt Strike

Session Passing from Cobalt Strike to Core Impact [HQ]

Cobalt Strike and Core Impact Interoperability [HQ]

Core Impact and Cobalt Strike: Distinct Strengths, Enhanced Combination

Given its functionality as a multifaceted toolset, there are some features of Core Impact that users may not have taken advantage of. In this post, we’ll talk about SOCKS tunneling. Namely, we’ll walk through use cases of Core Impact’s SOCKS proxy capabilities and  how to use it together with Cobalt Strike.

Check out the video below to see both of these use cases in action:

Penetration Testing and Red Teaming software.

Why Core Impact?

The choice of the Penetration Testing Community, Core Impact is an analytics-driven solution for assessing and testing security vulnerabilities throughout your organisation.

Why Cobalt Strike?

Cobalt Strike is a powerful threat emulation tool that provides a post-exploitation agent and covert channels ideal for Adversary Simulations and Red Team exercises, replicating the tactics and techniques of an advanced adversary in a network.

You Can’t Protect Your Systems If You Don’t Know What Risks You Face.

Fortra’s cybersecurity and automation offerings give your organisation the tools you need to meet the challenges of today’s threat landscape. With vulnerability management solutions that help locate, analyse, prioritise, and track security weaknesses so you know what needs to be protected.