Physical Attacks, from Wifi compromising to Internal Network attack.
Mobile App Test
IoT, Embedded linux devices Test
Source Code Audit
Application Security Assessment
Each company has a software development team. This service aims to assist developers during the development life-cycle.
So fuzzing is used in order to discover Memory corruptions vulnerabilities, which could lead to remote code execution.
Reverse Engineering, Debugging, Exploit Development are used to show, to the customer, the criticality of these vulnerabilities.