Offensive security in mobile carriers, ISPs, 4G/5G core networks and billing platforms.
Why now
Telecom is national critical infrastructure. Attacks on HSS, IMS or SS7 expose millions of users. Roaming fraud and bypass of charging cost tens of millions. Anatel doesn't tolerate superficial pentest.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
MME, HSS, AMF, SMF, UDM. Diameter, GTP, HTTP/2 stateless.
eNodeB, gNodeB, fronthaul, OSS integration.
Billing, mediation, CRM, provisioning.
Fraud and interception in legacy SS7 networks.
Voice over LTE/WiFi, authentication, registration.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
Engagements with telecom operators and ISPs.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
Yes. Service-Based Architecture, AMF, SMF, UDM, NRF, mTLS validation, OAuth2 between NF.
Yes. BNG, BRAS, CGNAT, OSS, customer portal and Anatel integration.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.