IEDs are used for many purposes, run on different operating systems and offer a variety of interfaces. Given this, tools to simulate typical attacks must be developed for every single IED.
Manufacturers of intelligent electronic devices (e.g. switches, power converters, circuit breakers etc.)
Within the scope of our penetration tests we examine hardware and software for vulnerabilities.