Test and improve your Security
Attacks on critical assets and infrastructure are devastating by nature, and their consequences can linger well after the attacks were thought to have ceased. Despite the already relevant attack vectors that cyberattacks use, physical attacks are usually overlooked or underestimated when evaluating attack surfaces.
These physical attacks can include, but not be limited to:
- Key material and license verification algorithm retrieval from equipment/appliances physical memory dumps or local exploits, as well as hardware attacks (Fault Injection, Side Channel Attacks, Bootloader exploits…).
- Reverse engineering of protected solutions and consequent lower quality clones of reversed product appearing in market, as well as exploits to remotely access, modify or control products in an unauthorized way.
- Recover of material used to escalate a local attack to a remote one (such as VPN certificates, authentication information and credentials, APN configuration…).
In order to help you build, evaluate or test your systems or existing security solutions, we offer the following services:
Hardware Penetration Testing
- Test your device from the perspective of a Hacker with embedded systems skills
- Verify if your Security Requirements are met from a hardware perspective
- Have your product security evaluated to obtain a report for certifications.
Hardware/Embedded custom tools - We can help design and customize an embedded tool, including the firmware
- This service can be combined with others, such as reverse-engineering and special solutions.
Reverse Engineering - Have your hardware/solution tested against reverse engineering to evaluate the difficulty and/or cost to replicate it
- Provide us with a sample of a system/solution/hardware that is no longer manufactured and/or difficult to find and we can offer services to provide a 100% compatible customized part, including the project so you can directly manufacture these parts yourself in the future.
Special Solutions
- We offer special solutions and customized tools for law enforcement.
- Contact us to receive information about this service.