Supernetworks Security Labs
AI-assisted security testing with real over-the-air verification. We find memory corruption, authentication bypasses, and protocol vulnerabilities in WiFi stacks. We verify every finding is a true positive.
Every finding we report is verified with real over-the-air testing against live hardware. No theoretical bugs, no static analysis noise.
The WiFi testing matrix — frame types, authentication states, cipher suites, firmware versions — is too large to cover manually. Agents let us work through it systematically.
We test against real WiFi hardware over the air. Findings are reproducible on production firmware running on production chipsets.
How We Work
Our AI agents explore WiFi attack surfaces at scale. Our researchers verify every finding over the air on real hardware. You get confirmed, reproducible vulnerabilities.
AI agents generate bug hypotheses based on a vulnerability corpus and black-box analysis (or source analysis when available), then guide testing across firmware, kernel, and userland layers.
Every candidate finding is verified against real WiFi hardware over the air. We test on production firmware running on production chipsets.
We deliver confirmed vulnerabilities with reproduction steps and PoC code. Every report is actionable.
Agentic testing means we can re-run against new firmware revisions without starting from scratch. Ongoing engagements catch regressions as they ship.
Cryptographic protocol review, memory corruption analysis, firmware reverse engineering, and black-box WiFi stack auditing.
Protocol-level analysis of key derivation, session management, and authentication flows. Covers WPA2/WPA3, SAE, OWE, RADIUS, enterprise WiFi (802.1X), and proprietary extensions.
UAF, heap overflow, stack overflow, type confusion in firmware, kernel drivers, and userland WiFi daemons. Static and dynamic analysis with agentic fuzzing.
Binary analysis of closed-source WiFi chipset firmware. Register-level inspection, DMA attack surfaces, firmware update integrity.
Agentic testing against live implementations. Agents generate bug hypotheses, guide test execution, and flag anomalous behavior across the WiFi stack.
The team actively discovers and publishes WiFi and kernel vulnerabilities.
Pre authentication heap corruption in hostapd's WNM-Sleep Mode handling with TFS (Traffic Filtering Service) response processing.
Memory corruption in Intel's Wireless Daemon via malformed WiFi beacon frames. Exploitable for ASLR bypass and potential code execution on Linux wireless stacks.
Disclosure pending. Details will be published after vendor patch.
Analysis of leaked Chinese state-sponsored WiFi implant capabilities, hardware-based attack tools, and the defenses that stop them.
For teams with in-house security researchers. We ship you the hardware and basic packet injection tooling with approval. Your team runs the testing.
Full-scope engagement — crypto review + memory safety + agentic black-box testing. Detailed vulnerability report, exploit PoCs, and remediation guidance.
Combine your intelligence from your lab with our wireless capabilities. We provide the wireless expertise and hardware lab to help you get there.
Tell us about your product and what you need assessed.
Thank you. We'll review your submission and be in touch shortly.