Defense / Industry

  • Vulnerability search in industrial equipment

    • Objective: take control of an industrial process
    • Reverse engineer cryptography and network protocol, development third-party client
  • Assess secure boot

    • Objective: bypass secure boot
    • Reverse engineer, seek vulnerabilities, carry out exploit and bypass security
  • Automation of intelligence threat

    • Objective: analyze all incoming attachments
    • Orchestrate, automate, install IRMA and connect to other systems