IoT Vulnerability Mining Service
- Discover unknown vulnerability on IoT -
For users with advanced needs, we provide vulnerability mining services. It is unique in that it conducts actual attacks and research on unknown vulnerabilities in IoT products or systems. The scope and method of testing will be carried out after confirmation and coordination with the client.
The test results will be transparent and faithful to the customer. Through actual mining research, the risk of target vulnerabilities or vulnerabilities can be assessed from the test, and corresponding countermeasures and solutions can be formulated. Test procedures and results, as well as data generated by product risk analysis, can serve as a powerful basis for improvement recommendations.
The test results will be transparent and faithful to the customer. Through actual mining research, the risk of target vulnerabilities or vulnerabilities can be assessed from the test, and corresponding countermeasures and solutions can be formulated. Test procedures and results, as well as data generated by product risk analysis, can serve as a powerful basis for improvement recommendations.

The process includes the following stages:
1 . Scope : The client determines the scope and requirements of the project according to his own needs. After careful evaluation, we will determine the length of execution and quotation.
2 . Vulnerability mining : It spends the longest time on the whole process of vulnerability mining. Engineers use tools to collect relevant information and do reverse analysis to the target of mining to find and evaluate potential weaknesses.
3 . Vulnerability Test : Engineers write PoC Exploit for Vulnerability detection, and put relevant test records and results into the report.
1 . Scope : The client determines the scope and requirements of the project according to his own needs. After careful evaluation, we will determine the length of execution and quotation.
2 . Vulnerability mining : It spends the longest time on the whole process of vulnerability mining. Engineers use tools to collect relevant information and do reverse analysis to the target of mining to find and evaluate potential weaknesses.
3 . Vulnerability Test : Engineers write PoC Exploit for Vulnerability detection, and put relevant test records and results into the report.