Security analysis, pen testing and forensic investigations

Canary Tokens

Clean Defensive Trap
If you suspect that someone , locally, in your company or a remote sophisticated hacker is gaining access to you or your companies private information, then this simplistic service is an ideal way of catching them red handed.

Lay traps that automatically warn you by email when someone is doing something they shouldnt, like looking at your emails or files on your laptop, server or phone, there are many pre made traps to use, and you will be surprised at the results, that provide full location information. Price is per token.

Email Forensic Report

Find all Information on any Email Sender
We all get spam, but ever had a particular email that really irritates you, needs to be proven or is persistently annoying, and is especially toxic and worthy of criminal prosecution ?

This service is extremely popular, and can be used by any one that requires sender details and location. We will compile and send you a complete evidence report detailing all the hops and supposed tricks in getting, what the sender thinks, is an anonymous email to you. No one can hide..

Website Penetration Testing

Individual Websites and Applications
As certified ethical hackers and forensic examiners, we will manually test the security of your website, as this type of testing is much more accurate than automated software, which can miss weaknesses or give false positives.

You’ll receive two reports; an executive summary to give you an overview of the threats and weaknesses discovered and a detailed technical report for you to resolve, or for us to generate a quotation if work is needed to secure the site.

Server Security Analysis and Pen Testing

For Linux Servers and devices
Same concept as individual websites, but for custome devices and entire servers (normally LAMP) with all the applications and services provisioned. This includes Email, DNS, FTP, HTTP / HTTPS / HSTS, Control Panels, Mysql etc.

You’ll receive two reports; an executive summary to give you an overview of the threats and weaknesses discovered and a detailed technical report for your I.T team to lock down. This service requires 7 days to complete, and can be used to address problematic issues and trace unauthorised access.