Company
COMPANY'S SECURED
Company
PROJECTS DELIVERED
Research
INCREASE PER YEAR
With over 15 years of Research in the intelligence domain
we bring real solutions to the table by people who have created some of the most capable offensive & defensive tools in the Intelligence and Defense sectors.
Company
FATAL FLAWS EXPLOITED
Countries
BYPASSED SECURITY
Company
FATAL FLAWS UNCOVERED
A unique advantage of
Raykore
is our in house developed protocol stack that allows us to go beyond specifications in security testing and complete flexibility over all OSI layers above and below the transit IP protocols
MAP & Diameter for full 2G / 3G / 4G / 5G Radio Technology support
Fully programmable node that can act as HLR / HSS & SMS Home Router all in one
Features rich SMSC with in depth protection mechanisms against Simjacker / OTA / Binary SMS attacks & Simbox fraud
High performance signaling firewall with programmable elastic monitoring and honeypot capabilities for MAP / CAMEL & Diameter. The HTTP APIs are provided in XML and JSON formats, and support all layer from SS7 SCCP and any Diameter AVP
STP & DSC+ a three in one solution capable of acting as a Sigtran STP & Diameter DRA / DEA all in one single solution, with direct integration capabilities over multiple protocols with our transaction monitoring Firewall
Modular fuzzer, builder that goes beyond specifications, responsible for our 0 day vulnerability finds. Build to manipulate any part of the message construction, capable of stitching together MAP / Camel / TCAP / MTP / SCCP elements in any way we see fit
Modular fuzzer, builder that goes beyond 3GPP specifications, responsible for our 0 day vulnerability finds. Build to manipulate any part of the message construction, allowing us to stitch together and fuzz various AVP elements in any way we see fit
Reverse engineered VoLTE/WiFI fuzzer and injector capable of taking over consumer devices and utilizing them as an injection entry points to telecom IMS and relevant nodes. Proficient at fuzzing various call flaws and exposing vulnerabilities within network elements infrastructures
Be Confident, Be Secure in your products and execution
Extended CS/PS Core Network Vulnerability Assessment of Core Networks through International Roaming perspective. Evaluation of every GSMA FASG FS.11 category, in compliance with FS.11. Category 1, 2 & 3 SS7 signaling MAP messages.
Potential Week Elements
Black Box Breach Assessment
Acquisition of a Global Title that is whitelisted in the operators network without establishing roaming agreement.
Grey Box Breach Assessment
Operator provides IPSEC trunk with testing Global Title either through their signaling provider on directly on front facing Signaling Point to emulate INAT traffic.
Active Diameter signaling scanning of an Operator’s EPC Network from International Roaming perspective. This vulnerability assessment will evaluate FS.19 GSMA Category 0, 1, 2, 3 Diameter signaling messages.
Potential Week Elements
Black Box Breach Assessment
Acquisition of a Realm that is whitelisted in the operators network without establishing
roaming agreement.
Grey Box Breach Assessment
Operator provides IPSEC trunk with whitelisted Realm either through their signaling provider on directly on front facing Signaling Point to emulate INAT traffic.
Active IMS signaling scanning of an Operator’s IMS VoLTE Access. This Vulnerability Assessment will cover FS.22 VoLTE Security Analysis and Recommendations” GSMA FASG document cases for VoLTE.
Potential Week Elements
Black Box Breach Assessment
Acquisition of a VoLTE / VoWiFI capable simcard without operator intervantion
Grey Box Breach Assessment
Acquisition of a VoLTE / VoWiFI capable simcard and remote accessible device via the assistance of the operator
In Depth testing of radio access Base stations and controllers
Exploitation and identification of week points in web applications for the identification of various vulnerabilities
In depth testing of hardware devices utilized in various industries space
Disassembly, analysis and injection testing of applications for identification of potential vulnerabilities and week points of integrated APIs
In depth exploitation assessment for entry point and exploit identification for data farms, data centers, IOT network and more.
Be Innovative, Be The Trailblazer in your market
Innovate and introduce new products and service into your existing offerings, we have conducted an extensive amount of research for various industries focusing in the Defense / Space & Intelligence Sectors. We will undertake the complete cycle of R&D for your idea and delivery the finalized product.
Industry Expertise
We offer in depth training seminars and workshops for intelligence domain subjects, with the capacity to conduct them either in your establishments or through virtual mediums
Telecom Training Subjects
OSINT Training Subjects
Other Trainnings On Demand!
We help you design custom technology solutions tailored to your business needs. This can be customizing an existing application, assisting with IT outsourcing services, or creating a dedicated team of software consultants to achieve your business goals.
Software development, project management, IT services, software modernization whatever your organization needs, we will help you meet your business requirements. Our expertise spans an area of niches, topics, and sectors.
Turn your Projects Into A Reality
We are excited to help you, our team will contact you as soon as possible or feel free to contact us directly on
sales@raykore.com