SIMULATE THE REAL WORLD ADVERSARY TACTICS WITH
IOT and Product Security

Embedded Devices Security Assessment
The Embedded Devices used for various IoT tasks like, Collection, Aggregation, Monitoring and Analysis of data are reviewed with a variety of assessment techniques like:
- Passive Analysis through Serial ports
- Review of deployed Authentication
- Mechanisms in Embedded Devices
- Firmware Dumping over JTAC
- Firmware Dumping over Flash Chips
- External Media-based attacks
- Power Analysis and Side Channel-based attacks
- IoT Technology Stack analysis
OT Device Stack Analysis
Security posture of the software associated with the OT device, starting from firmware that runs on the device, the applications used to control the device, the cloud components connected to the device, and monitoring solutions ingested to the infrastructure are reviewed. This includes the following:
- Firmware analysis
- Integrity testing
- Flow Analysis
- Reverse Engineering of the companion applications
- Run Time manipulation attacks
- Network Communication review
- SDK review
- Business and Logic Flaw detection
- Authentication and Authorization testing
- Client-Side injection
- Sensitive Data Leakage
Radio Communication Security Assessment
Radio Communication protocols like, cellular, WI-Fi, BLE, ZigBee, Wave, 6LoWPAN, LoRa etc., are reviewed for the possibility of attacks such as:
- Man-in-the-middle attacks
- Replay-based attacks
- Insecure Cyclic Redundancy Check (CRC) verification
- Jamming-based attacks. (Roll-jam attack)
- Denial of service (DoS)
- Lack of encryption (ADB-S Packet)
- Ability to extract sensitive information from radio packets (GQRX or GNU Radio)
- Live radio communication interception and modification
Using the latest hardware testing tools and techniques
We discover device security concerns down to the chip level using the most up-to-date hardware testing tools and techniques, such as glitching and side-channel analysis with FPGAs. The OWASP IoT Top Ten and other industry standards are followed throughout.
Build security into your product development process
Integrate security into the product development process. A product security review, when used early in the design process, can spot parts with known security flaws and prevent future expensive hardware upgrades. Your environment's security as a whole is only as strong as its weakest connection.
Need a quote? Get in touch with us!
Super power your security assessment program with NST Cyber’s comprehensive assessment services.
Powered by NST Assure
You are always in control of managing your security assessment projects, remediation process, and revalidation assessments with NST Assure’s powerful collaboration and orchestration features.
- Be in line with security assessment process
- Holistic view of the threat posture for any or all assessment projects
- Real-time Collaboration with your Security Assessment Team
- Schedule Report walkthroughs or Debrief sessions at your convenience
- Secure Download of assessment reports and trackers
- Understand risk to compliance requirements before it is too late
- Focus on what needs attention and cut the noise
- Demonstrate ROIs and security posture to Executive teams