Work with us

Services

Overview

Capability development

Introduction

In order to keep pace with the high end of the attacker space, adversary simulation providers need to have access to top-tier capabilities. Building strong in-house capabilities is hard, particularly when it comes to domains requiring a rare intersection of skills.

Our capability development services, ranging from developing red team capabilities to our bespoke trainings, can help you deliver unique results and rapidly build expertise within your organization.

Red Team Operations

Red Team Operations (RTO) and automated Breach and Attack Simulations (BAS) are meant to holistically evaluate an organization's security posture in light of the most relevant and impactful threats. This means that RTO and BAS service providers need to have access to top-tier capabilities in order to keep pace with the high end of the adversary space. After all, how else will defenders be able to evaluate the performance of their EDR and IDS solutions, the skillset of their Blue Team and all the other security controls that are supposed to keep out more than just the small fry. As a result, there is increasing pressure on RTO and BAS service providers to invest heavily into the kind of offensive R&D that requires highly specialized knowledge and skillsets. Our background in evasive research, real-world 0-day exploit development, and development of state-of-the-art IDS solutions allow us to deliver capabilities at the tip of the spear.

Tailored R&D

We don't just break things. We also build things to break things. As part of our multi-disciplinary R&D efforts we have developed automated program analysis solutions for the identification of unknown cryptographic primitives, written decompilers for complex DSP architectures, built custom embedded fuzzers, developed implants for deeply embedded systems running obscure RTOSes, and delivered proprietary protocol dissectors for sensor deployments in critical infrastructure. We are more than happy to assist our customers in developing new cutting-edge tools, whether as a rapid prototyping effort or as part of a quick response to ad-hoc operational requirements.

Training

We understand how difficult it can be to build up strong in-house capabilities, particularly when it comes to domains requiring a rare intersection of skills. In order to help our customers bridge this gap, we offer bespoke security trainings focused on embedded reverse engineering and offensive operations against cyber-physical systems. We have a background in teaching graduate-level offensive cyber-security courses which enables us to render accessible subject matter which often seems daunting at first sight.

Adversary Emulation for Operational Technology (OT)

Specialized Forensics

Our researchers have successfully recovered valuable data from Bitlocker and TPM protected disks, as well as from self-encrypting drives. Additionally, we also provide clients with unique forensics services for embedded devices such as PLCs or automotive ECUs.