Attify helps businesses secure their IoT devices, mobile applications and digital assets.
By offering unique security assessment, penetration testing and training to organizations all over the world, Attify is the leading global security provider.
Worried about your website, infrastructure or IoT device security? Our security experts helps you secure your digital asset by identifying all possible security issues.
Domains: IoT pentesting, Hardware, firmware, mobile applications, big data, infrastructure.
Avail our unique training offerings delivered globally - both in-person and through webex. Customize the training courses as per your requirement.
Courses running: IoT Security and Exploitation, Mobile app pentesting, Infrastructure exploitation
Need hardware devices for your pentest? Buy devices such as Attify Badge helping you to exploit IoT device hardware. Buy devices for Zigbee, BLE and radio sniffing. And more.
Head over to Attify Store now. Shipping now to All over the world.
DEF CON 27
Attify will be showcasing its latest products and learning kits at the Def Con 27 booth in Las Vegas from Aug 8-11th, 2019.
Real World InfoSec training
Attify now conducts private training sessions globally on topics including Internet of Things Penetration Testing and Exploitation, Mobile application pentesting, Infrastructure pentesting and DevOps security and Exploitation.
Attify Store launched
Attify launched an online store to help security enthusiasts get tools and devices for learning Electronics, DIY and Security.
IoT Exploitation Learning Kit Launched
Attify launches a learning kit to teach IoT Security enthusiasts practical hands-on exploitation techniques with hardware devices, tools, labs, slack community and additional resources.
LATEST FROM OUR RESEARCH COOKBOOK
Exploiting Bluetooth Low Energy using Gattacker for IoT
In this post, we are going to discuss about how to take over a BLE based IoT smart bulb, sniff the communication packets and perform modification and replay based attacks - all in a setup that costs < $10.
Some of the things we are going to cover in this post:
- Installing and Configuring Gattacker
- Analyzing Advertisement and Service packets for an IoT device
- Overhearing and dumping the data transferred between the mobile and the device
- Performing a replay attack with the dumped file
Introduction to attify badge
Welcome to the new blog post by Attify. In this blog post, we will introduce our newest creation – Attify Badge, something which we use in order to perform hardware exploitation and to hack IoT devices.
This is also covered extensively in our training course “Offensive IoT Exploitation”, where we teach attendees on how to exploit the smart devices. We use this to perform UART sniffing, root over serial, JTAG debugging, dumping memory and so on.