Core Impact Exploit Search Engine

As Core Impact's exploit database grows, it becomes more difficult to find the exploit/module you are trying to run. Let's say you are looking to test your network against the latest worm or even an old one—finding that specific exploit in the list of the more than 300 modules available could take a while. It is better to let Core Impact search the exploit list for you. Core Impact allows you to search in different ways: by CVE, service, name, and target OS. The search engine is divided into six types of requests, as shown in Table 9-1.

Table 9-1. Core Impact search engine options

Type

Your search

Typical request

All

  

CVE

CVE-2005-3223

2005-3223

Category

Local module only

Local

Name

Exchange CDO

Exchange

Service

Exploit for HTTP server

http

Supported system

Module for Windows 2000 system

Windows 2000

The trick when searching with Core Impact is to keep it simple. For example, say you are looking for the old CAN-2006-0237 exploit. Since we do not know whether the exploit was incorporated into Core Impact or whether it is still a CAN-* and has not been updated to a CVE-*, it is better to just search for the years, without the "CAN" or "CVE" portion of the name. The same logic can be applied to exploit names or services. Don't be too specific; there are only 300 modules.