Sektor7 is a small information security research company based in Poland, EU, focusing on developing new and refined offensive techniques and technologies.
Sektor7 was founded in 2017. Our team has a vast experience backed by many years of research and work for external companies from the following, but not limited to, industries:
Apart from pure offensive research, we deliver various information security training in the following domains:
Sektor7 is an organizer of x33fcon conference, an annual gathering of Blue and Red Teams in Europe.
- threat simulations
- offensive counterintelligence
- network security
- software exploitation
- malware analysis
- web security
- hardware exploitation
"Failure is the key to success; Each mistake teaches us something."
Morihei Ueshiba, The Art of Peace
Sektor7 Research Lab focuses on developing novel and evolving existing offensive techniques in information security world. These include attacks on:
- *NIX-based OS
- Windows OS
- communication technologies
We also develop new offensive tactics for long-term cyberoperations and threat simulations.
Some of our work is being published at security conferences and blog posts.
"Progress comes to those who train and train; reliance on secret techniques will get you nowhere."
Morihei Ueshiba, The Art of Peace
We offer the following trainings:
- APT Wargames: Long Term Operations - Post-exploitation red-teaming exercises covering tactics, techniques and procedures (TTPs) used during months/years lasting offensive operations. It concentrates on persistence, survival and operating under the blue team’s radar.
- APT Wargames: Red vs. Blue - Blue/Red team exercises simulating specific threat actor (ie. FIN7 group), allowing students to understand how particular attack phase is conducted and how Blue teams can detect and respond to a specific TTP.
- APT Wargames: AV/IDS Evasion & Bypass - tactics and techniques used to bypass modern antivirus and intrusion systems in Windows environments.
- APT Wargames: Netwars Masterclass - advanced network attacks training, covering attacks on routing and redundancy protocols, network level man-in-the-middle attacks and backdooring routers.
- Internet of Things Hacking - a set of methods to conduct penetration testing of commercial hardware devices, including hardware analysis, fuzzing and backdooring.
- ExtREme Malware Analysis - is aimed to teach our approach to fast and effective malware reversing, demonstrating some no-so-cutting-edge technologies and tricks that are drastically speeding up a reversing process.
- Car Hacking - a hands-on practical training covering car’s internal networks, protocols and security modules design, protocol threats and how to perform attacks, as well as how to think about security of these systems.
- Offensive Mobile Application Exploitation - an introductory course on exploiting iOS and Android applications, suited well for both beginners as well as advanced security enthusiasts. It covers ARM and OS exploitation of different kinds of vulnerabilities in Mobile applications. This is an extensive hands-on class where the students will be exploiting all of these taught vulnerabilities. The course will also discuss how an attacker can secure their application using secure coding & obfuscation techniques.
Please feel free to contact us: firstname.lastname@example.org