hun
img
img
About Us

Who We Are

We are specialists in the digital landscape—tech enthusiasts, dedicated and detail-oriented. As investigators and data restorers, our mission is to provide our partners with the confidence they need during data-related legal proceedings. Leveraging IT forensic expertise, we deliver precise and verifiable insights into past events. Our local and international partners, along with our team of skilled professionals, ensure our company delivers stable, reliable results. Covering a full spectrum of business incident management services, we provide all necessary solutions under one roof. With decades of experience in forensic analysis, our team is ready to support your business.

Committed to Development

We are continuously developing our organization and technical expertise to adapt to the ever-evolving IT landscape, ensuring that we deliver high-quality services. Our team members are committed to technological advancement and innovative solutions. We support our staff with ongoing trainings and personalized coaching, empowering them in their professional growth and strengthening their effectiveness as a collaborative team.

img

Creating Value for Our Partners

Our philosophy is to build win-win partnerships that foster mutual success and collaboration.

As a Hungarian-based provider, we are readily available for in-person consultations, offering support to both companies and private clients.
We assist in navigating the legal landscape so that our partners can fully leverage the benefits our services provide.
Recognizing that every client’s needs are unique, we tailor our services with flexibility to meet specific requirements.

SERVICES

With its knowledge of forensic methodologies and procedures, the Forensics Office is able to examine the following devices and systems:

  • Unlocking of devices (phones/tablets) (Android, iOS, MS, Blackberry, etc.), via software (USB, Bluetooth, WiFi connectivity) and hardware (JTAG/ISP/eMMC/chip-off)
  • Physical acquisition of devices
  • Logical acquisition of devices
  • Analysis and reporting
  • SIM card reading, data backup, including active and sometimes deleted data


  • Unlocking, extraction, and analysis requiring partner lab assistance (e.g., unlocking/extraction of iPhone devices at Cellebrite’s lab in Munich)

  • Creation of authentic bitwise copies in requested formats from hard drives, SSDs, flash drives, memory cards, active or degraded RAID arrays, etc., using solutions like Tableau, R-Studio, Paladin, in E01 or RAW formats
  • Data extraction/mirroring in-lab and on-site (mobilizing equipment as needed)
  • Data carving (using various tools as necessary)
  • Analysis and reporting
  • Additional services that do not fall under other categories


  • For all commonly used operating systems
  • Apple Mac EFI password unlocking or bypassing
  • Supported and analyzable file systems: FAT (FAT12, FAT16, FAT32), exFAT, NTFS, HFS and HFS+, HPFS, APFS, UFS, ext2, ext3, ext4, XFS, btrfs, ISO 9660, ZFS, ReiserFS, UDF, Novell*, etc.
  • Unlocking of LUKS, TrueCrypt, VeraCrypt, BitLocker, if sufficient information is available, depending on the case
  • Extraction of encrypted WD hard drives
  • Data carving based on file signatures


  • Extraction of video recordings from recorders, even in cases of unknown/encrypted file systems and formats
    (HIK 264, HIK FAT, DHFS_41, WFS0.4, DSB_DVR, WFS0.3, HIK_IMHK, WFS0.1, BLUESKY, HB_MS, VVF, DHFS_4, HB_dc, JVS_801, STL_MPEG, MP4, DHFS_40, WB, LOOSAFE, ZHILING1.0, HB_fat, WB_0dc, BOLI 264, WFS0.2, WB_1dc, JVS_601, HB_msv2, etc.)
  • Unlocking or bypassing DVR/NVR passwords
  • Conversion of extracted recordings to widely recognized formats
    (MPEG, AVI, MKV, etc.)
  • Video enhancement, zooming, cleaning, etc.
  • Other DVR/NVR related tasks
  • Analysis of data (e.g., identifying persons, vehicles, license plates), as feasible and where the data includes the relevant information
  • Car dash cameras


  • Face analysis through comparison points, 3D/2D modeling
  • Technical reporting on face analysis, usable in expert opinions


  • Detection of image and video manipulation (photo forgery and video forgery)
  • Detection of hidden content within content (steganography)



  • Our Additional Services

    Server log analysis

    Online real-time analysis

    Cloud infrastructure inspection

    Monitoring for incident indicators

    testimonial
    Request data from

    Google, Facebook, Microsoft (Skype), etc.

    In this case, we can cooperate not as experts, but as consultants.
    testimonial
    Providing expert opinions

    With the help of our IT forensic expert partner, Privnet Kft.
    (IM reg. number: 010739)

    WHY CHOOSE US?

    Our flat-rate service contract ensures the stability of the services we provide to our business partners

    In today's business environment, continuous presence is almost essential for success, which includes precise knowledge of technologies and methodologies. As soon as you are ready for professional application of forensic methodologies, we will assist your business success with ongoing and up-to-date solutions. This service, which we generally provide as a flat-rate service, offers direct access to professional solutions throughout the business relationship. The constant availability and high-availability agreements lead to business solutions that provide quick resolutions for all parties involved.

    image
    img
    img
    image

    We provide for our contracted partners:

    • Continuous availability
    • Preparation of forensic reports
    • On-site deployment within 24 hours
    (depending on the contract and location)
    • 24/7 helpdesk
    • 24/7 technical duty with proactive monitoring
    • Guaranteed technology suitability
    • Fast and flexible customer service, engineering support

    image

    Supplementary services

    • Network system supervision
    (wired and wireless networks, firewalls, network active devices, engineering consultancy)
    • Router monitoring and remote configuration
    • LAN and Wi-Fi network design and implementation
    • VPN network design and operation

    image

    Our five-step system ensures that we meet the highest expectations.

    1. Assessment: After incident detection, determining forensic tools.
    2. Planning: Defining the execution of forensic examinations.
    3. Execution: Preparing the evidence.
    4. Verification: Confirming the expert opinion.
    5. Delivery of the expert opinion and report.

    img
    CHOOSE US!

    Request a personalized offer!

    Contact us
    OUR PARTNER
    image
    img
    logo

    Contact

    forensicsoffice.com

    info@forensicsoffice.com

    www.linkedin.com/company/forensicsoffice

    Owner:

    image

    András Soltész
    CEH

    soltesz@forensicsoffice.com


    Copyright © Forensics Office. All Rights Reserved. Webdesign: Montasy.hu
    img