Offensive security in factories, ERP, MES, industrial IoT and automated production lines.
Why now
Industry 4.0 connected everything — and exposed everything. A line stopped by ransomware costs production hours that don't come back. An attack can tamper with recipes (pharma, food) with public-health consequences.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Manufacturing execution system and shop-floor supervision.
Audit of Siemens, Rockwell, Schneider PLCs in automated lines.
Cobots, AGVs, vision systems and functional safety.
SAP PP/MM/QM, ERP-MES-OT integration.
Formulation integrity and bill of materials.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
ArcelorMittal and large industrial clients.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
No. We work in homologation environments or pre-agreed maintenance windows.
Yes. Passive protocol analysis (Modbus, Profinet, EtherNet/IP) and PLC replica testing.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.