splone
  • Protection from Cyber Attacks
  • Identification of Vulnerabilities and Exposed Gateways
  • Independent Security Checks by Experts
  • Security Audits According to Accepted Standards
More about Penetration Tests

About

splone is a Berlin-based IT security research team and consultancy.

We help improving IT-security by offering red team assements, penetration tests, audits and customized consulting. Our clients receive flexible and transparent solutions well tailored to their individual needs.

We highly value research. It helps performing successful attacks as well as improving the security of the digital systems. Our team works with insights from the open-source research and hacker community to defend customers against known and emerging threats with a focus on connected technologies like Web, IoT or SCADA systems.

References

  • Critical Infrastructure Audit - Wasserverband Strausberg-Erkner

    We performed an internal and external penetrationtest. Both tests were grey box tests.

    Mountain View
  • Critical Infrastructure Audit - Stadtwerke Ettlingen GmbH

    We analyzed the possibilities to manipulate the communication of muncipal utilities. We tested for vulnerabilities from an internal as well as an external perspective.

    Mountain View
  • Threat Detection - Rhebo GmbH

    With an in depth ICS expertise splone helped improving the Rhebo's Industrial Protector.

    Mountain View
  • Penetration Testing - Carfax Europe GmbH

    splone did multiple gray box penetration tests. We worked on their CMS based websites as well as their API servers.

    Mountain View
  • Red Teaming - Assecor GmbH

    With a Red Team Test splone helped Assecor improving the company infrastructure. Besides the usual technical assessments splone performed social engineering compaigns.

    Mountain View
  • Penetration Testing - Education4Industry GmbH

    splone conducted several penetration tests for University4Industry to ensure the comprehensive IT security of their customers. For this, splone oriented among other things to the test guidelines of the OWASP.

    Mountain View

Blog

Typical Wi-Fi attacks

by techge
Last time we presented the main characteristics of the 802.11 standard, often simply referred to as Wi-Fi. This time we want to discuss specific security weaknesses and problems of Wi-Fi networks by presenting typical attack ... more

IEEE 802.11 Frames and How to Get Them

by techge
In the next months we will present some insights we got while analyzing devices that provide so-called industrial Wireless LAN. To get a general understanding of these devices some basic knowledge about Wi-Fi and the ... more

Writeup of the covfefe CTF

by kuekerino
Writeup of the covfefe CTF Capture the Flag (CTF) challenges offer a great opportunity to practice hacking skills in a controlled and legal environment. One of the most common places to look for such challenges ... more
Get more InformationContact