contact@p1sec.com

P1 Vulnerability Knowledge Base (VKB) is a unique up-to-date database of all vulnerabilities that are detected by our expert consulting findings.
P1 Telecom Auditor (PTA) is a Core Network, SS7 and SIGTRAN vulnerability scanner and security auditor for 2G, 3G and LTE networks.
PTF (P1 Telecom Fuzzer) is a Telecom protocols oriented fuzzer using automated fuzzing tests generation & reproducible fuzzing tests.
P1 Telecom Monitor (PTM) is an Intrusion Detection System (IDS) specifically designed for Signaling Core Networks. PTM enables tracking and reduction of signaling network misuse, providing a dashboard of frauds and attacks.

P1 Security is the World Leader in Telecom Security Software & Services

P1 Security is one of the very few companies in the World tackling telecom security through pure Mobile and Telecom Security attacks and security from 5G and Cloud Security, OpenRAN, Network Slicing and RAN Sharing, Edge Computing (MEC), OpenRAN down to legacy 4G Diameter, SS7 SIGTRAN attacks, GTP manipulation and fuzzing…

P1 Security offers Threat Intelligence through the converged use of our PTM Network Intrusion Detection System & VKB Vulnerability Knowledge Base and their integration into a TSOC (Telecom Security Operations Center). Our researchers have presented studies on 5G Protocols, Core and RAN Security, Cloud Computing security for Operators, SS7 and HLR security and demonstrated how HLR/HSS can be brought down with simple attacks over SS7 networks. They have also shown attacks on the LTE Core using silent compromise of Central Core Network Elements like DRA.

P1 Labs, the R&D branch of P1 Security, is leading many research projects, investigating mobile and telecom networks infrastructures’ exposure and subscribers’ privacy leaks.

We are a Vendor independent, neutral Company with established references in Europe, Americas, Africa, Middle East, Pacific and Asia.

Recent News

New open-source MCC_MNC library

P1 Security is working with mobile operators worldwide, and therefore requires a good knowledge of identifiers used in mobile networks. The P1 Lab has worked carefully to identify all public information related...

Read More…

5G SUPI, SUCI and ECIES

The 3GPP has defined a nice subscriber’s identity protection scheme for 5G networks. This is a way for 5G handsets and terminals (or UE, in the 3GPP terminology) to encrypt the subscriber’s identity...

Read More…