Help
RSS
API
Feed
Maltego
Contact
Domain > www.intratecdigitalforensics.co.za
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-06
197.221.14.7
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Mon, 06 Jan 2025 08:12:50 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Tue, 10 Jan 2012 13:28:05 GMTETag: 1fc7-4b62c7c2d4340Accept-Ranges: bytesContent-Length: 8135Vary: Accept-EncodingContent-Type: text/html html>head> title>wrclub.net/title>style>td{font-family:Tahoma;font-size:11px;color:#000000;}a{color:#2020E8;}.CENTRE { text-align: center; color: #000;}a:link { color: #900; text-decoration: none;}a:visited { color: #000; text-decoration: none;}a:hover { color: #900; text-decoration: none;}a:active { color: #999; text-decoration: none;}/style>meta http-equivContent-Type contenttext/html; charsetutf-8>/head>body topmargin0 leftmargin0 bottommargin0 rightmargin0>table cellpadding0 cellspacing0 border0 height100%>tr> td rowspan10 width50% height100% backgroundimages/bg1222.jpg stylebackground-position:right top; background-repeat:repeat-y>/td> td rowspan10 width1 bgcolor#000000>/td> td colspan2> table cellpadding0 cellspacing0 border0> tr> td colspan2 width780 height77 backgroundimages/bgsearch.jpg>/td> /tr> tr> td colspan2>a href>img srcimages/01.jpg border0>/a>a href>img srcimages/02.jpg border0>/a>a href>img srcimages/03.jpg border0>/a>a href>img srcimages/04.jpg border0>/a>a href>img srcimages/05.jpg border0>/a>img srcimages/06.jpg border0>img srcimages/top.jpg border0>/td> /tr> tr> td rowspan3>img srcimages/HomeGRN.jpg>/td> td>img srcimages/Trust.jpg>/td> /tr> tr> td>a href>img srcimages/t01.jpg border0>/a>a href>img srcimages/t02.jpg border0>/a>a href>img srcimages/t03.jpg border0>/a>a href>img srcimages/t04.jpg border0>/a>/td> /tr> tr> td height20 bgcolor#ffffff>/td> /tr> /table> /td> td rowspan10 width1 bgcolor#000000>/td> td rowspan10 width50% height100% backgroundimages/bg1223.jpg stylebackground-position:left top; background-repeat:repeat-y>/td> /tr>tr> td valigntop> table cellpadding0 cellspacing0 border0> tr> td width378 height35 backgroundimages/bgdate.jpg>/td> /tr> tr> td classCENTRE>a hrefindex.html>HOME/a> | a hrefComputerForensics.html>COMPUTER FORENSICS/a> | a hrefDataRecovery.html>DATA RECOVERY/a> | a hrefFAQ.html>FAQ/a> | a hrefContactUs.html>CONTACT US/a>/td> /tr> tr> form action> /form> /tr> tr> td>img srcimages/HEAD_Welcome.jpg>/td> /tr> tr> td width378 height35 backgroundimages/bg02.jpg valigntop stylepadding-top:7px;> div stylepadding-left:15px;padding-right:15px;> table cellpadding0 cellspacing0> tbody> tr> td bgcolor#FFFFFF>We offer all associated services from advice, site inspection, seizure (there is a very specific methodology that is required should your case go to court to maintain the correct chain of evidence), data acquisition, drive cloning, retrieval and ultimately the data analysis. Then the reporting is done and if needed, expert testimony will be given as part of the service./td> /tr> tr> td bgcolor#FFFFFF>./td> /tr> tr> td bgcolor#FFFFFF>p alignleft>An interesting snippet from the United States Secret Service on how to recognize digital evidence:/p> p alignleft>Computers and digital media are increasingly involved in unlawful activities. The computer may be contraband, fruits of the crime, a tool of the offense, or a storage container holding evidence of the offense. Investigation of any criminal activity may produce electronic evidence. Computers and related evidence range from the mainframe computer to the pocket-sized personal data assistant to the floppy diskette, CD or the smallest electronic chip device. Images, audio, text and other data on these media are easily altered or destroyed. It is imperative that law enforcement officers recognize, protect, seize and search such devices in accordance with applicable statutes, policies and best practices and guidelines./p> p alignleft>Answers to the following questions will better determine the role of the computer in the crime:/p> ul> li>Is the computer contraband of fruits of a crime? br> For example, was the computer software or hardware stolen? br> /li> li>Is the computer system a tool of the offense? br> For example, was the system actively used by the defendant to commit the offense? Were fake IDs or other counterfeit documents prepared using the computer, scanner, and color printer? br> /li> li>Is the computer system only incidental to the offense, i.e., being used to store evidence of the offense? br> For example, is a drug dealer maintaining his trafficking records in his computer? br> /li> li>Is the computer system both instrumental to the offense and a storage device for evidence? br> For example did the computer hacker use her computer to attack other systems and also use it to store stolen credit card information?/li> /ul> p alignleft>Once the computers role is understood, the following essential questions should be answered:/p> ul> li>Is there probable cause to seize hardware? br> /li> li>Is there probable cause to seize software? br> /li> li>Is there probable cause to seize data? br> /li> li>Where will this search be conducted? br> ul> li>For example, is it practical to search the computer system on site or must the examination be conducted at a field office or lab? br> /li> li>If law enforcement officers remove the system from the premises to conduct the search, must they return the computer system, or copies of the seized date, to its owner/user before trial? br> /li> li>Considering the incredible storage capacities of computers, how will experts search this data in an efficient, timely manner?/li> /ul> /li> /ul>/td> /tr> /tbody> /table> /div>/td> /tr> tr> td>div stylepadding-left:15px;padding-right:15px;>/div>/td> /tr> tr> td> /td> /tr> /table> /td> td valigntop> table cellpadding0 cellspacing0 border0> tr> td>img srcimages/Staff.jpg>/td> /tr> tr> td> /td> /tr> tr> td>img srcimages/Why use intratec.jpg width210 height40 altWhy>/td> map name02> area shaperect coords70,185,125,210 href> /map> map name03> area shaperect coords70,185,125,210 href> /map> /tr> tr> td>img srcimages/Data Security.jpg altDataSecurity width210 height40 alignright>/td> /tr> tr> td>img srcimages/Data Recovery.jpg width210 height40 altDataRecovery>/td> /tr> tr> td>img srcimages/Forensic Facts.jpg altForensicFacts width210 height40 alignright>/td> /tr> tr> td> /td> /tr> tr> td>p>Intratec offers a host of SPECIALISED DATA SERVICES, if you are in any situation that you may now know who to turn to, we are able to assist./p> p>We have decades of experience, highly trained staff and your privacy is guaranteed./p> p>please contact us immediately for further assistance:/p> p>img srcimages/NationalContact.jpg width402 height42 altNationalContactNumber>/p>/td> /tr> /table> /td>/tr>tr> td height70 stylepadding-left:30px;> /td>/tr>tr> td height100%>/td>/tr>/table>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Mon, 06 Jan 2025 08:12:51 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Tue, 10 Jan 2012 13:28:05 GMTETag: 1fc7-4b62c7c2d4340Accept-Ranges: bytesContent-Length: 8135Vary: Accept-EncodingContent-Type: text/html html>head> title>wrclub.net/title>style>td{font-family:Tahoma;font-size:11px;color:#000000;}a{color:#2020E8;}.CENTRE { text-align: center; color: #000;}a:link { color: #900; text-decoration: none;}a:visited { color: #000; text-decoration: none;}a:hover { color: #900; text-decoration: none;}a:active { color: #999; text-decoration: none;}/style>meta http-equivContent-Type contenttext/html; charsetutf-8>/head>body topmargin0 leftmargin0 bottommargin0 rightmargin0>table cellpadding0 cellspacing0 border0 height100%>tr> td rowspan10 width50% height100% backgroundimages/bg1222.jpg stylebackground-position:right top; background-repeat:repeat-y>/td> td rowspan10 width1 bgcolor#000000>/td> td colspan2> table cellpadding0 cellspacing0 border0> tr> td colspan2 width780 height77 backgroundimages/bgsearch.jpg>/td> /tr> tr> td colspan2>a href>img srcimages/01.jpg border0>/a>a href>img srcimages/02.jpg border0>/a>a href>img srcimages/03.jpg border0>/a>a href>img srcimages/04.jpg border0>/a>a href>img srcimages/05.jpg border0>/a>img srcimages/06.jpg border0>img srcimages/top.jpg border0>/td> /tr> tr> td rowspan3>img srcimages/HomeGRN.jpg>/td> td>img srcimages/Trust.jpg>/td> /tr> tr> td>a href>img srcimages/t01.jpg border0>/a>a href>img srcimages/t02.jpg border0>/a>a href>img srcimages/t03.jpg border0>/a>a href>img srcimages/t04.jpg border0>/a>/td> /tr> tr> td height20 bgcolor#ffffff>/td> /tr> /table> /td> td rowspan10 width1 bgcolor#000000>/td> td rowspan10 width50% height100% backgroundimages/bg1223.jpg stylebackground-position:left top; background-repeat:repeat-y>/td> /tr>tr> td valigntop> table cellpadding0 cellspacing0 border0> tr> td width378 height35 backgroundimages/bgdate.jpg>/td> /tr> tr> td classCENTRE>a hrefindex.html>HOME/a> | a hrefComputerForensics.html>COMPUTER FORENSICS/a> | a hrefDataRecovery.html>DATA RECOVERY/a> | a hrefFAQ.html>FAQ/a> | a hrefContactUs.html>CONTACT US/a>/td> /tr> tr> form action> /form> /tr> tr> td>img srcimages/HEAD_Welcome.jpg>/td> /tr> tr> td width378 height35 backgroundimages/bg02.jpg valigntop stylepadding-top:7px;> div stylepadding-left:15px;padding-right:15px;> table cellpadding0 cellspacing0> tbody> tr> td bgcolor#FFFFFF>We offer all associated services from advice, site inspection, seizure (there is a very specific methodology that is required should your case go to court to maintain the correct chain of evidence), data acquisition, drive cloning, retrieval and ultimately the data analysis. Then the reporting is done and if needed, expert testimony will be given as part of the service./td> /tr> tr> td bgcolor#FFFFFF>./td> /tr> tr> td bgcolor#FFFFFF>p alignleft>An interesting snippet from the United States Secret Service on how to recognize digital evidence:/p> p alignleft>Computers and digital media are increasingly involved in unlawful activities. The computer may be contraband, fruits of the crime, a tool of the offense, or a storage container holding evidence of the offense. Investigation of any criminal activity may produce electronic evidence. Computers and related evidence range from the mainframe computer to the pocket-sized personal data assistant to the floppy diskette, CD or the smallest electronic chip device. Images, audio, text and other data on these media are easily altered or destroyed. It is imperative that law enforcement officers recognize, protect, seize and search such devices in accordance with applicable statutes, policies and best practices and guidelines./p> p alignleft>Answers to the following questions will better determine the role of the computer in the crime:/p> ul> li>Is the computer contraband of fruits of a crime? br> For example, was the computer software or hardware stolen? br> /li> li>Is the computer system a tool of the offense? br> For example, was the system actively used by the defendant to commit the offense? Were fake IDs or other counterfeit documents prepared using the computer, scanner, and color printer? br> /li> li>Is the computer system only incidental to the offense, i.e., being used to store evidence of the offense? br> For example, is a drug dealer maintaining his trafficking records in his computer? br> /li> li>Is the computer system both instrumental to the offense and a storage device for evidence? br> For example did the computer hacker use her computer to attack other systems and also use it to store stolen credit card information?/li> /ul> p alignleft>Once the computers role is understood, the following essential questions should be answered:/p> ul> li>Is there probable cause to seize hardware? br> /li> li>Is there probable cause to seize software? br> /li> li>Is there probable cause to seize data? br> /li> li>Where will this search be conducted? br> ul> li>For example, is it practical to search the computer system on site or must the examination be conducted at a field office or lab? br> /li> li>If law enforcement officers remove the system from the premises to conduct the search, must they return the computer system, or copies of the seized date, to its owner/user before trial? br> /li> li>Considering the incredible storage capacities of computers, how will experts search this data in an efficient, timely manner?/li> /ul> /li> /ul>/td> /tr> /tbody> /table> /div>/td> /tr> tr> td>div stylepadding-left:15px;padding-right:15px;>/div>/td> /tr> tr> td> /td> /tr> /table> /td> td valigntop> table cellpadding0 cellspacing0 border0> tr> td>img srcimages/Staff.jpg>/td> /tr> tr> td> /td> /tr> tr> td>img srcimages/Why use intratec.jpg width210 height40 altWhy>/td> map name02> area shaperect coords70,185,125,210 href> /map> map name03> area shaperect coords70,185,125,210 href> /map> /tr> tr> td>img srcimages/Data Security.jpg altDataSecurity width210 height40 alignright>/td> /tr> tr> td>img srcimages/Data Recovery.jpg width210 height40 altDataRecovery>/td> /tr> tr> td>img srcimages/Forensic Facts.jpg altForensicFacts width210 height40 alignright>/td> /tr> tr> td> /td> /tr> tr> td>p>Intratec offers a host of SPECIALISED DATA SERVICES, if you are in any situation that you may now know who to turn to, we are able to assist./p> p>We have decades of experience, highly trained staff and your privacy is guaranteed./p> p>please contact us immediately for further assistance:/p> p>img srcimages/NationalContact.jpg width402 height42 altNationalContactNumber>/p>/td> /tr> /table> /td>/tr>tr> td height70 stylepadding-left:30px;> /td>/tr>tr> td height100%>/td>/tr>/table>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]