about Adam Engineering
Founded in 2005
Founded in 2005, Adam Engineering has many focuses from reverse engineering , automotive tool development to IT security consulting i.e penetration testing "ethical hacking" and cyber forensic auditing. To emerge as a leader in the field of information technology, we develop robust technologies and services that help to provide the best solutions to our clients. Our technique is to thoroughly study the new edge technology requirements and derive the best possible solutions.
Adam Engineering
-
Automotive Control Unit Analysis/Disassembly
This is the process by which we analyze a specific control unit for the information required to access the flash or other memory via the diagnostic port, if possible.
With the level of access found we try to get access to basic command like download data and upload data used to read/write bytes from flash and eeprom.
-
Micro Processor Analysis/Disassembly
- Binary file disassembling.
- Code and data analysis, structure and connections recovery.
- Code and scheme analysis, determination of functions and device operating modes.
- Scheme analysis, determination of data transfer and processing protocols
-
Seed Key Algorithm Analysis/Disassembly
Seed-Key Security or Seed-Key Algorithm
Seed-key security is used by some communication protocols to gain access to ECU functions, which are therefore protected from unauthorised access.
The basic idea is that the ECU provides a seed -- a short string of byte values -- and the tool is required to transform that seed into a key using a secret algorithm. The ECU applies the same algorithm internally, and compares the key value given by the tool to its own value. If the two agree, the tool is assumed to "know" the secret algorithm, and access is authorised.
-
IT security consulting
The best way to guarantee the security of your computing networks is to take on a trusted partner that makes it their core business to stay ahead of the criminal hacking community. Around 70% of all security breaches are due to vulnerabilities within the web application layer. We use state-of-the art security tools and techniques to identify design flaws and determine whether your code and/or servers are vulnerable.
PENETRATION TESTING / ETHICAL HACKING
- Discover vulnerable systems
- Conduct real world hacking simulations
- Mitigate threats and secure platforms
-
0
Brands Worked for
-
0
Solutions Delivered
-
0
Algorithms Extracted
Our Products
-
UZI Vin extraction tool
The VINextraction tool has been developed to assist law enforcement with extracting the electronic VIN(Vehicle Identific
-
Uzi Pro
Uzi PRO is a new version hand-held car code reader for VAG group cars (vw, audi, seat, skoda) cars. it supports almost a
-
Uzi Mini
CANBus covers up the new generation of instrument clusters from 2002, for VW / SEAT / SKODA/ Audi:
-
Uzi CS Diagnostic Scanner
The Uzi CS diagnostic scanner was specifically tailored to the Chinese manufactured cars i.e -: CAM, GWM, CMC, GONOW,
-
Stand Alone Flasher
Adam Engineering brings you a "Do it yourself no PC required flashing tool to tune your car in seconds" !! Qu
-
Smart Keyless Entry
The driver needs to simply carry the remote control / key with him, for the central locking system to unlock (on a door
Our Blog
-
Reverse Engineering VW online key programming function for Fun And Profit.
VW has an online service called GEKO which allows you to program keys to a vehicle.
-
Ecu data and flashing with Google Glass
So for a long while now we have been testing Google Glass and creating an app for flashing of ECU's as well as displ
-
Ford Ranger 3.2 TDCi
So most of the testing has been completed and this is what we managed to achieve on the Ford Ranger 3.2 TDCi
-
UAV development
We have been hard at work releasing our surveillance drones equipped with thermal camera's, so far here are some vid