CYBER FORENSICS
Our mission is to successfully recover your data. We protect data privacy since we specialize in information security and know the value our customers place on it. We recover data from all consumer devices. We also perform specialized business data recovery services for companies and government agencies.
Some of the methods perform include platter swaps, head stack replacements, reverse imaging, data carving, and file/database rebuilding.
Some of the information that can be recovered:
• Deleted data
• Email / Webmail
• Documents (PDFs, spreadsheets, videos, pictures, intellectual property, etc.)
• Databases
• Installed Programs
• Raids
• Basically anything to touch your hard drive.
• Deleted data
• Email / Webmail
• Documents (PDFs, spreadsheets, videos, pictures, intellectual property, etc.)
• Databases
• Installed Programs
• Raids
• Basically anything to touch your hard drive.
Mobile / Cell phone Forensics (We support almost 10,000 device profiles)
Everyone seems to have a mobile device and most crimes have a digital element to them. When you add Bring Your Own Device (BYOD) to the mix, a whole new mix of problems comes about. With this said, we can analyze a plethora of mobile devices.
Everyone seems to have a mobile device and most crimes have a digital element to them. When you add Bring Your Own Device (BYOD) to the mix, a whole new mix of problems comes about. With this said, we can analyze a plethora of mobile devices.
We are proficient with Parben, FTK MPE, Cellebrite, jailbreaking IOS, rooting Androids and the entire forensic process. We also understand Java and how to reverse engineer and analyze Android .apk packages. At this point we do not do “chip off” or JTAG forensics internally, we outsource.
Some of the information that can be found:
• Browser history
• Email / Webmail
• Documents (PDFs, spreadsheets, videos, pictures, intellectual property, etc.)
• Physical locations (GPS locations)
• Programs (malware, hacker tools, pirated software, etc.)
• Basically anything to touch your mobile device.
• Browser history
• Email / Webmail
• Documents (PDFs, spreadsheets, videos, pictures, intellectual property, etc.)
• Physical locations (GPS locations)
• Programs (malware, hacker tools, pirated software, etc.)
• Basically anything to touch your mobile device.
Computer Forensics (We support all versions of Windows / Apple / Linux / Unix)
If you delete a file, there is a possibility of recovering it years later. There are a lot of variables in place here, but if a suspect is breaking policy or the law, there is a good chance there may be artefacts of that activity on the system (computer, tablet, phone, game console, etc…)
If you delete a file, there is a possibility of recovering it years later. There are a lot of variables in place here, but if a suspect is breaking policy or the law, there is a good chance there may be artefacts of that activity on the system (computer, tablet, phone, game console, etc…)
Some of the information that can be found:
• Browser history
• Email / Webmail
• Documents (PDFs, spreadsheets, videos, pictures, intellectual property, etc.)
• Physical locations (GPS)
• Programs (malware, hacker tools, pirated software, etc.)
• Basically anything to touch your hard drive.
• Browser history
• Email / Webmail
• Documents (PDFs, spreadsheets, videos, pictures, intellectual property, etc.)
• Physical locations (GPS)
• Programs (malware, hacker tools, pirated software, etc.)
• Basically anything to touch your hard drive.
We are proficient with Parben P2 Commander, FTK 1-4, EnCase 4-7, WinHex, iLook, etc. and the entire forensic process. At this point we do not do “chip off” or JTAG forensics internally, we outsource.
Network Forensics
Kulan InfoSecurity offers a proactive investigation by gathering information and legal evidence obtained from monitoring and analysing computer network traffic. Our Forensics team understands the volatile and dynamic nature of data on the network and as such can help you and your organisation.
Kulan InfoSecurity offers a proactive investigation by gathering information and legal evidence obtained from monitoring and analysing computer network traffic. Our Forensics team understands the volatile and dynamic nature of data on the network and as such can help you and your organisation.
Some of the information that can be found:
• Passwords and keys (email, bank accounts, etc.)
• Internet activity (web browsing, email, chat, etc.)
• Files downloaded (hacker tools, pirated software, etc.)
• Malware (rootkits, trojans, worms, viruses, botnets, etc.)
• Cyber-attacks (denial of services, buffer overflows, SQL injections, known bad IP addresses, etc.)
• Basically anything to touch your network
• Passwords and keys (email, bank accounts, etc.)
• Internet activity (web browsing, email, chat, etc.)
• Files downloaded (hacker tools, pirated software, etc.)
• Malware (rootkits, trojans, worms, viruses, botnets, etc.)
• Cyber-attacks (denial of services, buffer overflows, SQL injections, known bad IP addresses, etc.)
• Basically anything to touch your network
Computer Incident Response Team (CIRT)
Keeping organizational information assets secure in today’s interconnected computing environment is a true challenge that becomes more difficult with each new “e” product and each new intruder tool. Most organizations realize that there is no one solution or panacea for securing systems and data; instead, a multi-layered security strategy is required. One of the layers that many organizations are including in their strategy today is the creation of a Computer Security Incident Response Team.
Keeping organizational information assets secure in today’s interconnected computing environment is a true challenge that becomes more difficult with each new “e” product and each new intruder tool. Most organizations realize that there is no one solution or panacea for securing systems and data; instead, a multi-layered security strategy is required. One of the layers that many organizations are including in their strategy today is the creation of a Computer Security Incident Response Team.
Kulan InfoSecurity offers incident response “live” forensics. Once the probable cause has been tripped, Our team takes it from there. We can help you:
• Investigate Who attacked, How they attacked and What occurred.
• Identify infected systems, hacker tools and compromised software.
• Malware (Identity, Contain and analyse its activities)
• with Disaster recovery and Business continuity
• Identify infected systems, hacker tools and compromised software.
• Malware (Identity, Contain and analyse its activities)
• with Disaster recovery and Business continuity