We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies.

IoT / Automotive / Embedded Linux penetration test

IoT / Automotive / Embedded Linux penetration test is simulated attack against your embedded device which aims to uncover weak points in its cyber security. Outcome of such penetration test is a comprehensive report and presentation that summarizes all security vulnerabilities found in your application and outlines optimal strategy to mitigate them.

Auxilium Cyber Security has experience testing broad range of embedded device ranging from military unit for protection of classified information through car head units to industrial routers.


Main goal of penetration test is to address vulnerabilities of your embedded device and propose adequate steps to mitigate them.

Methodology of IoT/ automotive / embedded Linux penetration tests

We have fully equipped embedded Linux penetration testing laboratory to carry out penetration test against various interfaces on embedded devices. We always adapt penetration test to the given device and we use some of the following scenarios:

  1. Attacking device via WiFi
  2. Attacking device via Bluetooth
  3. Attacking device via media player/USB
  4. Attacking device via CAN/UDS
  5. Attacking device via Internet connection
  6. Attacking device via CarPlay/MirrorLink/Android Auto
  7. Attacking device via Internet Browser
  8. Attacking device via physical interfaces + bootloader
  9. Attacking device via update procedure
  10. Attacking device via web administration system
  11. Finding Local Privilege Escalation misconfigurations
  12. Finding outdated/vulnerable components (libraries, etc.)
  13. And much more depending on a device

Penetration test of embedded Linux and Android systems is our key specialization. We operate own penetration testing lab, which is fully equipped with laboratory power supplies, USB2CAN adapters and OBDII diagnostics, USB-UART, multimeters, rooted Android and jailbroken iPhone phones, WiFi and Bluetooth controllers and much more.

UNECE WP.29 and ISO/SAE-21434 (automotive)

Appropriate cyber security measures will be integral part of all new vehicle registration on the markets following UNECE WP.29 (United Nations Economic Commission for Europe). This includes all EU countries together with UK, Turkey, Japan, Russia, Australia and others.

OEMs registering new vehicles for those markets must demonstrate Cyber Security Management System is in place covering among others:

  • The processes in place to verify that the risks identified are appropriately managed;
  • The processes used for testing the cyber security of a vehicle type;

Auxilium Cyber Security offers to conduct automotive penetration testing following UNECE WP.29 Annex 5 list of threats that complies with the certification requirement. You may therefore utilize results of our project towards your certification target.

Our approach to IoT / Automotive / Embedded Linux penetration tests

1. Understanding our client

We start by gaining close understanding of our client’s business and technical needs as well as gathering information about API itself, mainly number of endpoints and its architecture.

2. Agreement on commercial offer

Detailed commercial offer is prepared based on our understanding of your needs and requirements. Such offer includes penetration test methodology, testing scenarios, way of reporting results and the scope of the penetration tests. Outcome of this phase formally agreed penetration testing offer.

3. Penetration testing

Penetration test itself is carried out strictly in accordance with our common agreement. During the actual penetration testing our team reveals vulnerabilities in your API and demonstrate you how they can be misused by a hacker.

4. Reporting

We deliver detailed penetration testing report to your team. Such report includes all vulnerabilities together with suggestions on how to mitigate them. If required, we can also prepare executive summary presentation for your management to help you efficiently communicate such results to company decision-makers

5. Assistance with vulnerability mitigation

If your company has limited internal capacity, we can provide a support with mitigation of identified vulnerabilities.

6. Educating your dev team

We can also prepare tailor-made secure coding guidelines and training for your dev team which would reflect results of performed penetration test. This would help your team to avoid making same security mistakes again.

Why Auxilium Cyber Security?

  1. Experienced penetration testers with OSCP, OSCE or CISM certification
  2. Conducting in-house research in the cyber security field
  3. We deliver comprehensive penetration testing reports with proposed vulnerability mitigations
  4. We can support you in English, German, or Czech
  5. We have experiences with web applications penetration testing since 2015
  6. We can provide secure coding guidelines and training reflecting penetration test results

Our research in the field of cyber security of IoT / automotive

  1. [CVE-2021-29507] Improper Input Validation leads to buffer overflow in dlt-daemon
  2. CANdy – automated CAN bus message mapping framework


Germany: +49 (0) 7243 - 718 77 55
Czech Republic: +420 739 467 470




Siemensstraße 23
76275 Ettlingen
Přístavní 1363/1
17000 Prague
Czech Republic