Services
Beyond threats, we analyze the essence.
Beyond threats, we analyze the essence.
Services

Penetration Testing / Ethical Hacking
Penetration Testing / Ethical Hacking
PENTESTING & REDTEAM
PENTESTING & REDTEAM
We perform penetration tests simulating real attacks targeting our customers' services, products, assets, and their entire company.
We identify security vulnerabilities from the attacker's perspective and find areas that need improvement,
and provide a comprehensive analysis report on this.
The ultimate goal of this service is to identify actual security threats to our customers and
enhance security by strengthening their response capabilities.
We conduct penetration tests simulating real attacks targeting our clients' services, products, and assets.
And the entire company.
From the perspective of an attacker, we identify security vulnerabilities, find areas that need improvement,
and provide a comprehensive analysis report.
The ultimate goal of this service is to enhance security by identifying actual security threats faced by the client and strengthening their response capabilities.
We perform penetration tests simulating real attacks targeting our customers' services, products, assets, and their entire company.
We identify security vulnerabilities from the attacker's perspective and find areas that need improvement,
and provide a comprehensive analysis report on this.
The ultimate goal of this service is to identify actual security threats to our customers and
enhance security by strengthening their response capabilities.
Scope of execution
Scope of execution
WEB
WEB
APP
APP
SYSTEM
SYSTEM
IoT Device
IoT Device
NETWORK
NETWORK
Wireless device
(drone, router, etc.)
Wireless device
(drone, router, etc.)

Research / Analysis
Research / Analysis
RESEARCH & ANALYSIS
RESEARCH & ANALYSIS
Based on the perspective of the attacker,
we research together with our clients to build a safer security environment,
and provide analysis services.
Focusing on research into security vulnerabilities and cybersecurity,
we perform research / analysis / development.
Based on the perspective of attackers,
we conduct services to research and analyze together with our clients
to build a safer security environment.
Focusing on research into security vulnerabilities and cybersecurity,
we carry out research / analysis / development.
Based on the perspective of the attacker,
we research together with our clients to build a safer security environment,
and provide analysis services.
Focusing on research into security vulnerabilities and cybersecurity,
we perform research / analysis / development.
Scope of execution
Scope of execution
Scope of execution
Security vulnerability analysis
Security vulnerability analysis
Security vulnerability analysis
Vulnerability Analysis
- Testing vulnerabilities of commercial/open source applications and frameworks
- Discovery and analysis of specific vulnerabilities
- Testing vulnerabilities of commercial/open-source applications and frameworks
- Discovery and analysis of specific vulnerabilities
- Testing vulnerabilities of commercial/open source applications and frameworks
- Discovery and analysis of specific vulnerabilities
Device vulnerability research
Device vulnerability research
Device vulnerability research
Device Exploit Research
- Analysis of the potential for attacks on IoT/embedded device firmware, protocols, and peripheral interfaces
- Device vulnerability-based system takeover(Privilege Escalation, Rooting, etc.) Reproduction and vulnerability discovery
- Analysis of the potential for attacks on IoT/embedded device firmware, protocols, and peripheral interfaces
- Reproduction of system takeover based on device vulnerabilities (Privilege Escalation, Rooting, etc.) and discovery of vulnerabilities
- Analysis of the vulnerability of firmware, protocols, and peripheral interface attacks targeting IoT/embedded devices
- Reproduction and discovery of vulnerabilities based on device vulnerabilities (Privilege Escalation, Rooting, etc.)
Zero Day Research
Zero Day Research
Zero Day Research
0-day Vulnerability Discovery
- Discovery and reproduction of undisclosed vulnerabilities
- Application of the latest attack techniques and possession of a research environment based on real devices
- Discovery and reproduction of undisclosed vulnerabilities
- Application of the latest attack techniques and possession of a research environment based on real devices
- Discovery and reproduction of undisclosed vulnerabilities
- Application of the latest attack techniques and possession of a research environment based on real devices
Hardware and firmware reversing
Hardware and firmware reversing
Hardware and firmware reversing
Hardware & Firmware Reversing
- Circuit analysis, memory dump, JTAG/UART debugging
- Chipset/board-level analysis and physical vulnerability review
- Binary analysis and decryption, firmware analysis
- Circuit analysis, memory dump, JTAG/UART debugging
- Chipset/board-level analysis and physical vulnerability review
- Binary analysis and decryption, firmware analysis
- Circuit analysis, memory dump, JTAG/UART debugging
- Chipset/board-level analysis and physical vulnerability review
- Binary analysis and decryption, firmware analysis
Research on Communication-Based Security Review
Research on Communication-Based Security Review
Research on Communication-Based Security Review
Secure Communication System Analysis
- Analysis of Drone and Satellite Communication Protocols
- Signal-based threat simulation such as RF, GNSS, and Telemetry
- Review of OTA interface security, encryption protocol integrity
- Analysis of Drone and Satellite Communication Protocols
- Signal-based threat simulation for RF, GNSS, and Telemetry
- Review of OTA interface security, integrity of encryption protocols
- Analysis of Drone and Satellite Communication Protocols
- Signal-based threat simulation such as RF, GNSS, and Telemetry
- Review of OTA interface security, encryption protocol integrity
Omni-directional attack based research
Omni-directional attack based research
Omni-directional attack based research
Offensive Research
- Comprehensive attack possibility analysis for specific devices/systems
- Comprehensive vulnerability exploration including systems, communications, OS, and applications
- Construction and testing of attack scenarios based on real usage environments
- Comprehensive attack possibility analysis for specific devices/systems
- Comprehensive vulnerability exploration including systems, communications, OS, and applications
- Construction and testing of attack scenarios based on real usage environments
- Comprehensive attack possibility analysis for specific devices/systems
- Comprehensive vulnerability exploration including systems, communications, OS, and applications
- Construction and testing of attack scenarios based on real usage environments

CTF / Education
CTF / Education
CTF / Education
CTF CHALLENGE & EDU
CTF CHALLENGE & EDU
CTF CHALLENGE & EDU
We operate various programs that support the growth and development of hackers.
We provide educational services based on professional capabilities, including the production of educational materials,
content development, lectures, and training services ranging from basic course curricula
to training services for practitioners and experts.
We plan and operate CTF competitions, offering services related to the overall management of competitions, including system setup, problem development, and event operations.
We support the growth and development of hackers through various
programs.
We provide educational services based on professional competencies, including curriculum for basic courses as well as educational services that extend to practical and expert areas.
We plan and operate CTF competitions, offering services related to the overall operation of the competition, including system building,
problem development, and event management.
We operate various programs that support the growth and development of hackers.
We provide educational services based on professional capabilities, including the production of educational materials,
content development, lectures, and training services ranging from basic course curricula
to training services for practitioners and experts.
We plan and operate CTF competitions, offering services related to the overall management of competitions, including system setup, problem development, and event operations.
Scope of execution
Scope of execution
Scope of execution
CTF problem creation and operation
CTF problem creation and operation
CTF problem creation and operation
CTF Challenge Development & Hosting
- Web, WEB3, Network, Pwnable, Reversing, Crypto, and MISC problems can be generated in all areas.
- Various formats of systems such as Jeopardy / Attack & Defense / Scenario type are built and supported.
- Includes real-time supervision and operation, technical support, and answer review.
- Web, WEB3, Network, Pwnable, Reversing, Crypto, MISC problems can be created in all areas.
- Building and supporting systems in various formats such as Jeopardy / Attack & Defense / scenario-based.
- Includes real-time supervision and operation, technical support, and answer review.
- Web, WEB3, Network, Pwnable, Reversing, Crypto, and MISC problems can be generated in all areas.
- Various formats of systems such as Jeopardy / Attack & Defense / Scenario type are built and supported.
- Includes real-time supervision and operation, technical support, and answer review.
Scenario-based workshop battle
Scenario-based workshop battle
Scenario-based workshop battle
Scenario-based Red/Blue CTF
- Realistic simulated battles based on actual attack/defense scenarios
- Training purpose based on threat modeling for various industries
- Structure design of attackers (Red Team) vs defenders (Blue Team)
- Realistic simulated battles based on actual attack/defense scenarios
- Training purpose based on threat modeling for various industries
- Structure design of attackers (Red Team) vs defenders (Blue Team)
- Realistic simulated battles based on actual attack/defense scenarios
- Training purpose based on threat modeling for various industries
- Structure design of attackers (Red Team) vs defenders (Blue Team)
Educational CTF and explanation session
Educational CTF and explanation session
Educational CTF and explanation session
Educational CTF & Walkthrough Sessions
- CTF configuration and difficulty adjustment for beginner learners
- Problem explanations and reverse engineering/exploitation training conducted directly by the question setter
- CTF configuration and difficulty adjustment for beginner learners
- Problem explanations and reverse engineering/exploitation training conducted directly by the question setter
- CTF configuration and difficulty adjustment for beginner learners
- Problem explanations and reverse engineering/exploitation training conducted directly by the question setter
Security Capability Enhancement Program
Security Capability Enhancement Program
Security Capability Enhancement Program
In-house Security Capability Development
- Customized training and CTF operation for companies/institutions
- Internal workshops and performance of purple teams, etc.
- Customized training and CTF operation for companies/institutions
- Internal workshops and performance of purple teams, etc.
- Customized training and CTF operation for companies/institutions
- Internal workshops and performance of purple teams, etc.
Practice-based training session
Practice-based training session
Practice-based training session
Hands-on Training Session
- Providing practical curriculum such as Reversing, Pwnable, and Exploit Development
- Applying problem-based education (PBL: Problem-Based Learning) method
- Providing practical curriculum such as Reversing, Pwnable, and Exploit Development
- Applying problem-based education (PBL: Problem-Based Learning) method
- Providing practical curriculum such as Reversing, Pwnable, and Exploit Development
- Applying problem-based education (PBL: Problem-Based Learning) method
Educational content production
Educational content production
Educational content production
Training Content Development
- Planning and production of online lecture content by required topics
- Practice-centered problem-solving content and self-study video lectures
- Planning and production of online lecture content by required topics
- Practice-centered problem-solving content and self-study video lectures
- Planning and production of online lecture content by required topics
- Practice-centered problem-solving content and self-study video lectures
Scope of execution
We believe in the possibilities beyond technology.
WEB
APP
SYSTEM
IoT Device
NETWORK
Wireless device
(drone, router, etc.)
070-4110-1337 
(Representative Number)
02-861-1337 
(Invoice Inquiry)
02-861-1338 (Fax)
205-15 Gasan Digital 1-ro, 
Geumcheon-gu, Seoul 
Room 614, SH Dream Tower
We are waiting for 
colleagues to research together
© PetoWorks Inc. 2025
070-4110-1337 
(Representative Number)
02-861-1337 
(Invoice Inquiry)
02-861-1338 (Fax)
205-15 Gasan Digital 1-ro, 
Geumcheon-gu, Seoul 
Room 614, SH Dream Tower
We are waiting for colleagues to research together
© PetoWorks Inc. 2025
070-4110-1337 
(Representative Number)
02-861-1337 
(Invoice Inquiry)
02-861-1338 (Fax)
205-15 Gasan Digital 1-ro, Geumcheon-gu, Seoul Room 614, SH Dream Tower
We are waiting for 
colleagues to research together
© PetoWorks Inc. 2025