top of page

Services

Computer Forensics

Computer Forensics

Computer Forensics is a discipline that deals with the identification, acquisition, analysis and preservation of digital evidence on computers and storage devices. The goal is to ensure the integrity of data, so that it can be used as evidence in legal proceedings and investigations.

Phases of Computer Forensics

Identification and Seizure

  • Identify relevant devices: PC, hard disk, SSD, USB, NAS.

  • Preservation of chain of custody to ensure reliability of evidence.

Data Acquisition

  • Physical Acquisition: Creating a bit-for-bit copy of the entire disk, including hidden areas and bad sectors.

  • Logical Acquisition: Copy only accessible files, without modifying the original data.

  • Live Forensics: Collecting volatile data from a running system (RAM, active processes, network connections).

Forensic Analysis

  • File System Forensics: File system structure reconstruction and deleted data recovery.

  • Memory Forensics: RAM analysis to find credentials, malware, and active processes.

  • Network Forensics: Examining network logs and packets to detect suspicious activity.

  • Malware Analysis: Identifying malicious code and cyber attack techniques.

Documentation and Reports

  • Create detailed reports for investigators and courts.

  • Verify the integrity of evidence using timestamps, hashes and metadata.

Tools Used in Computer Forensics

File System Analysis and Data Recovery

  • Autopsy / The Sleuth Kit – For file system analysis and deleted data recovery.

  • FTK (Forensic Toolkit) – For analyzing disks, emails and volatile memory.

  • EnCase – Enterprise solution for complete digital investigations.

Memory and Network Traffic Analysis

  • Volatility – RAM analysis to detect malware, credentials, and suspicious activity.

  • Wireshark – Monitor and analyze network traffic to detect intrusions.

bottom of page