About Us | Contact Us    

 


 

Binary Analysis & Exploits

 
  BA Service Overview
  BA for Security Vendors

  BA for Governments & CERTs

  BA for Corporations & MSSPs
  Receive More Information
 
   
 

Receive Datasheet  

 
   

 
 

Receive detailed analysis of the most critical 1-day vulnerabilities

During the last few years, a significant increase in attacks exploiting known (1-day) vulnerabilities in commonly used programs such as Adobe Flash or Microsoft Internet Explorer is being observed. This is currently the primary initial infection vector used to compromise computers that have Internet access.

Although there are many ways to protect against cyber attacks and threats, governments need to leverage the most detailed security intelligence to evaluate risks, and protect national infrastructures and assets.

VUPEN Security provides
in-depth technical reports for the most significant public vulnerabilities based on disassembly, reverse engineering, protocol analysis, and code audit. The service allows government and federal agencies, and CERTs/CSIRTs to supplement their internal research efforts and keep ahead of the latest threats.

Only Available for Governments and Trusted CERTs

Because of the sensitive nature of the information provided through this service, VUPEN Security has defined strict eligibility criteria for participants. VUPEN Security solely reserves the right to determine whether an organization or corporation meets the criteria.

Eligible organizations are: Government Agencies and CERTs (access is restricted to some countries)

VUPEN Binary Analysis & Exploits Service includes:

  In-Depth Binary Analysis of Vulnerabilities

In-depth technical analysis including description of the root cause of the
  vulnerability, assembly code, registers, code flow paths and branches
In-depth description of the affected protocols or involved file formats
Exploitation techniques, reliability, mitigations and limitations
Detection guidance (exploit-based and vulnerability-based detections)
Deep references (links to third party articles, specifications, formats)
     
  Exploits & Proof-of-concept Codes

VUPEN develops and provides exploit codes or PoCs which allow gov.
organizations to:

Identify real and exploitable vulnerabilities within their infrastructures and networks
Evaluate the effectiveness of existing security policies, protections and patches
Distinguish real threats from false positives, and prioritize resources
Cut-time and quickly develop vuln-based and exploit-based signatures or detections
Improve security of their national infrastructures, and vital systems
     
  Packet Captures

In addition to exploits and/or PoCs which allow subscribers to replicate potential attacks,
VUPEN also provides packet captures (pcap) of the involved exploit
to easily replay packets
     
  Technical Support

As a subscriber, you will also have a direct access to the VUPEN Vulnerability Research
Team, the most active security team in the world.


Why subscribe to this service?

With a large number of available VUPEN technical reports and private 1-day exploits/PoCs, the the VUPEN Binary Analysis and Exploits service allows gov organizations to quickly and easily evaluate risks related the most recent vulnerabilities, and protect national infrastructures against critical vulnerabilities before they are exploited in the wild.

            

To verify your eligibility, receive prices or a formal quote,
contact Our Sales Department



 

Next Steps  

 


 

 

 

 

 

 

 

 

 

2004-2014 VUPEN Security - Copyright - Privacy Policy