Thank you for visiting our website. We recognize your time and data are valuable, so we have intentionally kept our website content short and precise. For more information or questions regarding your specific concerns or needs, please contact us here.

The investigation and analysis of forensically preserved and collected data and/or log files from any digital device(s), which has been attacked, compromised, exploited, or otherwise accessed by an unknown entity(ies) without authority or by any unapproved access.

Results derived from an Intrusion Forensic Investigation can be used to:
Pursue civil and/or criminal actions against the compromising or unauthorized entity(ies); and/or
Strengthen the area(s) of the digital infrastructure determined vulnerable, compromised, exploited or attacked.

  • Brute Force Attacks:
    • Guessing at a user name and password over and over until a match to a real account is found.
    • Accessing internal data or data without the authority that is not generally available to the public.
  • Cross-Site Scripting (XSS):
    • These attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites.
  • Server Side Includes (SSI):
    • SSIs are directives present on Web applications used to feed a web page (an HTML or PHP) page with dynamic content. They are similar to CGIs, except that SSIs are used to execute some “actions” before the current page is loaded or while the page is being visualized.
  • SQL Injections:
    • A SQL (pronounced see-quil) injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application (into a database). A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), among other things.

Intrusion Forensics involves the forensic collection and analysis of specific log files and other recent data for purposes of initiating an investigation or defining the direction of an investigation. Whereas Digital Forensics involves the forensic collection and analysis of all of a device’s data for an existing investigation. Ultimately, an Intrusion Forensic investigation may lead to the digital forensic investigation of one or more “third-party” devices.

Conducting network scanning and vulnerability checks, performing digital forensics, tracing cybercrime, and creating custom applications and hardware devices, PM Investigations has been an industry leader for over 20 years. Coming from a background in technology and law enforcement, PM Investigations prides itself in assisting over 3,500 clients from all over the world.