Methodology
How we work
A structured, repeatable process — not a one-off audit, but a documented security programme.
- 01 — Kickoff & Scope — We define what's tested, to what depth, and by when. Clear scope — no surprises.
- 02 — Architecture review — Schematic, BOM, and data flow review — before the device arrives. Pre-analysis accelerates the physical work.
- 03 — Physical & firmware analysis — Device arrives, hardware mapping, debug port identification, and firmware reverse engineering begins.
- 04 — Dynamic testing — Live traffic interception, protocol fuzzing, injection techniques. Real attack scenario simulation.
- 05 — Report & remediation roadmap — Structured audit report: CVSS-scored findings, compliance status table, prioritised remediation steps. Executive Summary for decision-makers, technical details for developers.