Deployment of Vestige virtual device containing tools to analyze client environment.
Triage of devices in environment to gain insights on:
The goal of the triage is to get an assessment of the scope of potential damage as well as identification of devices to examine in greater detail.
Capture of memory and disk images for thorough analysis. Review of devices to determine scope of involvement such as:
Analysis of log files to determine evidence of unauthorized access or data exfiltration. Potential sources of analysis include:
Analysis is dependent on available information due to settings, retention policy, etc.
Analysis of malware binaries and scripts to determine their purpose and identify any logical errors which could alter their intended purpose.
If you have any questions about our Digital Forensic Data Breach | Incident Response services please contact us for a free consultation.
Ctrl-Alt-Del: IT Reboot & Recovery
Data Breach | Incident Response
Data Recovery
Deletion Analysis
Device Usage Reconstruction
Document & E-mail Authentication
External Device Usage Analysis
Forensic Artifact Analysis
Internet History Analysis
Malware Analysis & Reverse Engineering
Mobile Device Analysis
Opposing Expert Critique
Password Cracking
Root Cause Analysis