Two Six Labs JAY team provides full spectrum computer network attack, exploit, and operations capabilities for classified and unclassified customers. Beginning with ground level hardware and firmware (including baseband), our team performs analysis on hardware printed-circuit-boards (PCBs) for undocumented signal traces and integrated circuit (IC) component analysis for reverse engineering and vulnerability research (RE/VR).
The team painstakingly analyzes the firmware and software components that may interface with hardware input/output, as well as analyzing devices and software or firmware of unknown origin with little to no source code or documentation. Our focus is attaining sufficient reverse engineering knowledge for vulnerability research.
Utilizing this knowledge, the extensive breadth and depth of our RE/VR experience enables the team to attack both via physical access with popular peripheral buses (e.g. USB, CAN etc.), and via remote access.
The Two Six Labs JAY team has applied this approach successfully to major mobile platforms (i.e. Android, IOS), Internet-of-Things (IoT) devices, and proprietary closed source communication stacks.