External surface
How internet-facing systems fail under real-world probing.
Internal network
Lateral movement paths once an attacker has a foothold. Which controls slow it down in practice.
Cloud infrastructure
AWS / Azure / GCP misconfigurations, IAM trust boundaries, service-to-service abuse paths.
Web applications
Auth bypasses, business-logic flaws, and the injections scanners miss.
Mobile (iOS & Android)
Reverse the binary, test the APIs it calls, inspect local storage and IPC.
APIs (REST & GraphQL)
Auth, authz, rate limiting, injection, and the data-exposure issues APIs ship with.
Embedded
Embedded firmware and bootloaders — IoT, routers, printers. OTA hijacks, hardcoded keys, factory-default weaknesses.
Broadband
ISP-provided gateways, cable modems, and fiber ONTs — the default-credentialed black boxes facing the internet.
AI supply chain
Malicious model files, agent hijacking, prompt-injection paths, and MLOps tooling.