Offensive security in OEMs, auto parts, vehicle connectivity, telematics and mobility platforms.
Why now
Cars are now computers on wheels. CAN bus, ECU, infotainment, OTA, telematics — every vector is an entry point. A cybersecurity-driven recall costs hundreds of millions and may involve criminal liability for defective products.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Firmware analysis, OBD-II exploitation, CAN bus manipulation.
Android Automotive testing, QNX, integration with driver app.
TCU, cellular communication, V2V and V2I.
Signature audit, rollback, update channel integrity.
Driver app, fleet management, insurance integration.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
Formula 1 client — top-tier automotive standards.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
Yes. We operate aligned to UN R155, R156 and ISO/SAE 21434 for homologation and CSMS.
Yes. ECU, gateway, TCU and tier 1 OEM platform pentest.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.