Product Info


IoT Vulnerability Mining Service

"More online device, More battlefields."

Now, many IoT products have come out one by one (such as various types of routers, list machines, networked monitoring and networked door locks and other smart networked devices.), and the security issues of IoT products are becoming increasingly important.

We focus on real attack security research on IoT products or systems, and assist manufacturers in discovering and patching unknown vulnerabilities to improve product security and reliability.

1. Carry out information collection and reverse analysis of the mining target to evaluate possible vulnerabilities.
2. For the exploited vulnerabilities, write attack programs for testing.
3. Based on the test data and risk analysis, write a report for each vulnerability, and provide the customer with the results and safety recommendations.

Back to company