Consulting and Pentests

Penetration Tests and security assessments

We regularly work on penetration tests in many different environments, with local or remote evaluations
  • Targeting specific systems like SCADA (factories hacked), calculators (infrastructures hacked), CCTV (camera networks hacked)
  • Intrusions over LAN, DMZ, VPN, WEB Apps, SAP, VoIP, Wifi, Databases
  • Hacking MDM: hacking a complete fleet of phones and tablets
  • Old-school PBX attacks: remote intrusion in LAN through forgotten modems worldwide
  • Servers, Workstations, Applications
  • Advanced Persistent Threats (APT), In-depth Hacking
  • Exfiltrate sensitive data beyond the infrastructure

Evaluations and 0days

We also work on investigations against specific products and technologies
  • Testing their maturity and their real strengths (0days)
  • Bypassing defensive technologies: antiviruses, firewalls, anti-spyware, proxies, NAC, etc

Examples of projects


Hacking networks

Penetrations into infrastructures

Operating systems

Penetrations into systems

Remote services

Remote intrusions in services

Local applications

Local security hacking

Hacking source code

Audit and evaluate source code

Hacking data

Bypass security (ciphering)

Hacking clouds

Remote hardened clouds

Hacking Scada

Industrial infrastructures

Hacking mobiles

MDM, apps, devices, BYOD

Hacking hackers

Finding and mitigating threats

Physical hacking

Cameras, check points

Forensics

Post-incident analysis

SIEM

Sec Info & Event Management

NIDS/NIPS

Intrusion Detection/Prevention

Honeypots

Decoys to delude attackers

Inventory

Find rogue devices

CSIRT - SOC

Incident Response - Sec Operating Center

Compliance

Implementing, validating