Hyperion Bristol is a specialist security firm offering consultancy to all levels of public and private enterprise.
Mobile and Computer
Advanced Threat Emulation
Advanced Persistent Threat Simulation and Attacks
Novel Technology Assessment
Drones, Electrical Grids and Commercial Aircraft
Helping you achieve your desired effect.
5 years of immersion in deep technical issues, combined with a pragmatic approach refined in an Maritime environment during service in the Royal Navy.
Our specialist areas cover most aspects of Critical National Infrastructure (Including SCADA), but focus on Aerospace and Maritime systems.
Projects and Latest News
So a whole year has come and gone, and It’s BSidesLondon time again. This is a precursor to a more in-depth blog post about my research into exploiting and defending the Traffic Collision Avoidance System aboard aircraft by injecting false traffic into the Automated Dependent Surveillance-Broadcast system. This formed my Masters project at the University[…]
So I was given the amazing opportunity to speak at Security BSides London (A security Conference) this Tuesday (29th April). BSides is a free to attend, community security conference run annually – if you want to look at the talks that were on, check out their website: https://www.securitybsides.org.uk/ I gave a talk on engaging university students[…]
As you are probably already aware, a certain person decided to smear a large number of highly classified documents over the internet. Part of these documents however included the ‘ANT’ Hardware Catalogue. ANT is a division of the NSA responsible for developing hardware devices and software for use by the ‘Tailored Access Operations’ division. The[…]
Over the last couple of weeks, I’ve been working through the excellent resource “Practical Malware Analysis – the hands on guide to Dissecting Malicious Software” (available from most good book retailers – http://www.amazon.co.uk/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901). There’s actually an example chapter at (http://www.nostarch.com/download/samples/practical-malware-analysis_ch12.pdf) For anyone who’s unsure exactly what the term ‘Malware’ encompasses (as it’s pretty broad) Wikipedia[…]
So I’m now into the post-exam season, but i’ve maintained the smorgasbord of projects that were put on hold for my degree. For those SCADA enthusiasts amongst you, i’ve been attempting to verify some potential Zero-Day exploits before I publish the sequel to my last post. More news on that later potentially. However, I’ve spent[…]
Occasionally, I go through my spam folder to see if there’s anything interesting inside. Previously i’ve found some cool Malware samples and new attack methods this way. One of these emails was obviously spam, obviously sent by a hi-jacked email account. I thnik its best choose;) http://coach-parenting.com/reply.santa37.php?jpycjvylilexer So obviously, we go and click the link.[…]
There’s been very little activity on this site, but I thought i’d start to document some of the projects i’m involved in. Today, I plugged in and started up the Allen-Bradley Micrologix 1100 Controller that i’ve been sitting on for a couple of months. Plugging in proved interesting, as the device runs on 100-240V AC.[…]