• Our Services
  • Knowledge Centre
  • About
  • Contact
  • Our Services
    • Adversary Simulation
    • Application Security
    • Penetration Testing
    • Response
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Contact
  • Adversary

    Adversary Simulation

    Our best in class red team can deliver a holistic cyber attack simulation to provide a true evaluation of your organisation’s cyber resilience.

  • Application Security

    Application
    Security

    Leverage the team behind the industry-leading Web Application and Mobile Hacker’s Handbook series.

  • Penetration Testing

    Penetration
    Testing

    MDSec’s penetration testing team is trusted by companies from the world’s leading technology firms to global financial institutions.

  • Response

    Response

    Our certified team work with customers at all stages of the Incident Response lifecycle through our range of proactive and reactive services.

  • Research

    MDSec’s dedicated research team periodically releases white papers, blog posts, and tooling.

  • Training

    MDSec’s training courses are informed by our security consultancy and research functions, ensuring you benefit from the latest and most applicable trends in the field.

  • Insights

    View insights from MDSec’s consultancy and research teams.

  • SQL Injection in Samsung Voice Framework Application

    Nov 27th, 2015

    Written by: Admin

    Mobile

    Vulnerability Description The Samsung Voice application provides a means to control your smartphone through voice commands, such as initiating calls to the device’s contacts. It is installed by default on…

  • Multiple Vulnerabilities in SED Systems’ Decimator D3

    Oct 8th, 2015

    Written by: Admin

    Exploitation

    During a recent penetration test, MDSec found several vulnerabilities in a RF spectrum analyzer that was exposed to the Internet. The SED Systems Decimator D3 is the third generation of SED’s popular…

  • An Introduction to Hardware Hacking: the RIPE Atlas probe

    Sep 22nd, 2015

    Written by: Admin

    Hardware

    RIPE NCC is building the largest Internet measurement network ever made. RIPE Atlas employs a global network of probes that measure Internet connectivity and reachability, providing an unprecedented understanding of…

  • My Lulzy Pwniez – Abusing the ELF loader in PonyOS

    Sep 22nd, 2015

    Written by: Admin

    Exploitation

    PonyOS is a hobby Unix-like operating system that uses it’s own kernel, built from scratch. This makes it a great research target for exploring software exploitation concepts. The OS is…

  • Instrumenting Android Applications with Frida

    Apr 2nd, 2015

    Written by: Admin

    Mobile

    As you may have heard, our latest publication the Mobile Application Hacker’s Handbook is out. When you’re writing a book you have to agree a number of things with the…

  • Upcoming Training Events 2015

    Marius Ciocirlan

    Mar 27th, 2015

    Written by: Admin

    News

    If you’re interested in web and/or mobile security and want to learn some cutting-edge techniques, then we have just the thing! This April and June we’re running two training courses…

  • Apple iOS Hardware Assisted Screenlock Bruteforce

    Mar 11th, 2015

    Written by: Admin

    Mobile

    We recently became aware of a device known as an IP Box that was being used in the phone repair markets to bruteforce the iOS screenlock. This obviously has huge…

  • The Mobile Application Hacker’s Handbook

    Awaiting Image

    Feb 25th, 2015

    Written by: Admin

    Mobile

    Following on from our previous publications in the Hacker’s Handbook series, MDSec’s director Dominic Chell has co-authored a new book on how to secure mobile applications. The Mobile Application Hacker’s…

  • 44Con 2014: GreedyBTS – Hacking Adventures in GSM

    Awaiting Image

    Nov 20th, 2014

    Written by: Admin

    Mobile

    At 44CON in September 2014, MDSec presented “GreedyBTS: Hacking Adventures in GSM” where we discussed our research of 2.5G network attacks against mobile devices. We outlined many existing known weaknesses…

  • Heartbleed Teardown

    Awaiting Image

    May 1st, 2014

    Written by: Admin

    News

    Yesterday we presented some of our exploitation notes on the Heartbleed vulnerability at 44Cafe and shared some of the lessons learned, the slides are available for review here: The accompanying…

Page 12 of 14First«11 12 13»Last

Recent Posts:

  • Function Peekaboo: Crafting self masking functions using LLVM
  • How Scattered Spider Exploited Weak Links in UK Retail Security
  • Red Teaming with ServiceNow
  • Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris)
  • Nighthawk 0.3.3 – Evanesco

Archive:

  • October 2025
  • March 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • June 2024
  • April 2024
  • March 2024
  • February 2024

Page Links:

  • Responsible Disclosure Policy
  • Nighthawk
  • Privacy Policy
  • MUTUAL NON-DISCLOSURE AGREEMENT
  • Home
  • Our Services
    • Adversary Simulation
      • Red Team Operations
      • Purple Teaming
    • Application Security
      • Application Security
      • Large Language Models
      • Mobile Security
    • Penetration Testing
      • Infrastructure Security
      • Product Assessment
      • Cloud Security Assessment
    • Response
      • Retained Response
      • Emergency Response
      • Cyber Readiness
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Careers
  • News
  • Contact
MDsec

Services

  • Adversary Simulation
  • Application Security
  • Penetration Testing
  • Response

Resource Centre

  • Research
  • Training
  • Insights

Company

  • About
  • Contact
  • Careers
  • Privacy

t: +44 (0) 1625 263 503
e: contact@mdsec.co.uk

32A Park Green
Macclesfield
Cheshire
SK11 7NA

Accreditations

Best
IT Health Check Service
Crest Star
Crest
Cyber Essentials
British Assessment Bureau
Copyright 2026 MDSec