We have a standard rule for everybody on the team: you must know how to write a memory corruption exploit. Too many so-called “penetration testers” can’t write proof-of-concept exploits to illustrate critical vulnerabilities to their clients. For those clients who need advanced exploits as part of our security assessment services, we can deliver that.
On the defense side, we’ve analyzed “in the wild” exploits by reverse engineering them to find out how their underlying functions allow privileged access to systems and networks. Whatever kind of exploit analysis or development our commercial clients may need for their internal risk management, we've got you covered.
Please Note: We only conduct exploit development exercises in the course of assisting the security programs of our large commercial clients; we do not do any work related to cyber warfare activities.
Copyright © 2017, Include Security®. Design by Star Graphic Design