Computer forensics lab
    Computer Forensics · Australia & New Zealand

    Hard drives, memory,
    network traces —
    pieced together.

    We image computers and servers, recover deleted records, reconstruct user activity and produce reports that withstand cross-examination — across Windows, macOS, Linux and virtualised infrastructure.

    Coverage
    Windows · macOS · Linux
    Capacity
    Petabyte-scale matters
    Reports
    Hash-verified, court-ready
    What We Examine

    Every artefact a system leaves,
    on a single timeline.

    Modern computers leave traces in dozens of places — disk, memory, registry, logs, sync services. We work each one methodically and reconcile them into a single chronological view a court can follow.

    Layer01

    Forensic disk imaging

    Bit-for-bit acquisition of HDDs, SSDs, NVMe and removable media — write-blocked, hash-verified, defensible.

    Layer02

    Live memory capture

    RAM acquisition for credentials, encryption keys, running processes and malware indicators that vanish on shutdown.

    Layer03

    Deleted file recovery

    Carving, MFT and journal analysis recover deleted documents, images and records — even after wipe attempts.

    Layer04

    Network & endpoint logs

    Firewall, proxy, DNS, EDR and Windows event logs reconstructed into a single defensible timeline.

    Layer05

    Encrypted volume analysis

    BitLocker, FileVault, VeraCrypt and APFS encrypted containers — examined where lawful keys or recovery is possible.

    Layer06

    Email & document review

    PST, OST, mbox and Exchange archives parsed and searched at scale, with full metadata and attachments preserved.

    Platform Coverage

    Whatever the system,
    we have a method.

    From a single laptop to a clustered virtual environment — we work to the highest forensic standard the platform and its security state allow.

    Windows01

    Windows 7 → 11 · Server

    NTFS, ReFS, registry hives, $MFT, USN journal, Event Logs, ShimCache, AmCache and SRUM analysed end-to-end.

    • NTFS
    • Registry
    • Event Logs
    macOS02

    Intel & Apple Silicon Macs

    APFS imaging, FileVault handling where lawful, Unified Logs, KnowledgeC, Spotlight metadata and Time Machine analysis.

    • APFS
    • Unified Logs
    • Time Machine
    Linux & Unix03

    Servers & workstations

    ext4, XFS, ZFS, journald, auditd and bash history — with LVM and encrypted volume reconstruction.

    • ext4 / XFS
    • journald
    • auditd
    Servers04

    Physical, virtual & RAID

    Onsite imaging of running servers, ESXi and Hyper-V snapshots, RAID 0/1/5/6/10 reconstruction.

    • ESXi
    • Hyper-V
    • RAID
    The Toolkit

    Court-grade software,
    written-into-record practice.

    Our examinations are built around industry-standard forensic platforms — write-blocked acquisition hardware, validated imaging tools, and analytical suites used by Australian law enforcement and corporate investigators.

    Every step is documented. Every file is hashed. Nothing is opened on a live drive. The output is an exhibit pack a magistrate, judge or arbitrator can rely on.

    File systems

    30+

    RAM capture

    Live & paged

    Encrypted volumes

    BitLocker · FileVault

    Reports

    Hash-verified

    The Process

    Calm, methodical,
    court-grade from intake.

    Step01

    Intake & scoping

    Confidential brief, lawful authority confirmed, devices and custodians scoped, fixed-fee quote provided.

    Step02

    Forensic acquisition

    Write-blocked imaging onsite or in our lab. Hashes captured. Chain of custody opened.

    Step03

    Analysis & reconstruction

    Artefacts parsed, deleted data carved, timelines and user activity reconstructed across systems.

    Step04

    Court-ready report

    Plain-English findings with annotated exhibits. Expert testimony available where required.

    Frequently Asked

    Computer forensics, plainly explained.

    Request A Consultation

    Send A Brief.
    We'll Take It From There.

    Every enquiry is read by a licensed investigator and treated in strict confidence.

    Step01

    You send a brief

    A short note about your matter — no detail required upfront.

    Step02

    We reply within one business day

    From a licensed investigator, not a chatbot or call centre.

    Step03

    If we're the right fit, we book a call

    Confidential. No obligation. Fixed-fee quote where possible.

    Confidential. Read by a licensed investigator. No call centres, no chatbots.