Reverse engineering

Find out vulnerabilities in your equipment

  • Goals

    This type of mission allows you to audit heavy applications, hardware or IoT equipment without having its source code. The detailed examination of a product or software will detect vulnerabilities or hidden functionalities.

  • Methodology

    They require specific skills and extensive expertise in low-level languages and software and hardware architecture.

Example of missions:

  • 1

    Identification of IoC within malware as part of an APT.

  • 2

    Audit of a heavy remote administration client.

  • 3

    Study of a disk encrypted by biometric authentication.

  • 4

    Analysis of oxygen bottle management equipment (IoT)

You want to know more?