Firmware analysis
Extraction (binwalk, chip-off, OTA capture), filesystem inspection, hardcoded secrets, weak crypto, bootloader trust, signing verification.
IoT devices, embedded systems, thick clients. Firmware extraction and analysis, hardware interface probing (JTAG, UART, SPI), radio communication (BLE, Zigbee, sub-GHz), and the cloud backend the device authenticates to.
Coverage adapts to the device. Some engagements stay software-only; others involve hardware lab work.
Extraction (binwalk, chip-off, OTA capture), filesystem inspection, hardcoded secrets, weak crypto, bootloader trust, signing verification.
JTAG, UART, SPI, I2C debug interfaces. Bus sniffing. Glitching attacks where in scope. Secure-boot bypass evaluation.
BLE security mode, Zigbee key handling, sub-GHz proprietary protocols, WiFi configuration security, Matter compliance where applicable.
Often the easier attack surface. Same coverage as our mobile pentest service, with focus on device-trust assumptions.
Device-authentication flows, OTA update integrity, telemetry handling, tenant isolation. Often where a compromised device pivots into other customers.
Device opening, chip identification, conformal coating, anti-tamper sensor evaluation. Documented but rarely the primary attack surface.
Multi-layer testing from chip to cloud. Hardware work happens in our lab; cloud and app work happens like a normal engagement.
IoT pentest deliverables.
Per-finding: severity, layer (firmware/hardware/radio/app/cloud), exploit chain, photos, fix guidance.
Reverse-engineering output: filesystem dump, binary observations, secret findings, suggested hardening.
JTAG / UART / SPI accessibility, what we found, what would have prevented access.
Post-fix retest on a new firmware build. Devices retained for the retest window unless you ask for return.
Common triggers for an IoT / embedded pentest.
Matter, FIDO, PSA Certified, or sector regulator (FDA, FCC) requires security testing before launch.
Connected medical or automotive device. The cost of a public incident is far above engagement price.
A large enterprise customer asks for security report before deploying your device fleet.
Connected device fleets need regular testing — firmware versions ship continuously, new attack surface with each release.
Common questions for this engagement type. See main pentest FAQ for shared questions.
For most engagements, yes. Hardware interface testing (JTAG, UART) requires the device in our lab. Cloud and companion-app portions can run remote.
2 to 3 sample devices. One for non-destructive testing, one for destructive (chip-off, bus-pirate), one spare. Specific firmware version pinned.
We have lab capability for BLE, WiFi, Zigbee, and sub-GHz protocols. Proprietary radio protocols may need custom tooling — scoped on a case-by-case basis.
IoT engagements need 4 to 6 weeks lead time for device acquisition and lab scheduling. Book the scoping call early.