24/7/365 Highend service
Legal holistic approach The only way to achieve defensive security is through an offensive mindset and approach
T Office ©
Offensive Network Security
T Office © Services
Client Supra Omnes.
Disloyal employees, whistle-blowers and cyber criminals cause every year companies and organizations multi-billion USD loses. Many companies do not want publicly speak about weaknesses in their cyber security. Hidden statistics is high.
An disloyal employee who at work e.g. surf privately on unsuitable Internet sites, steal company secrets to start a competing business or vilify her employer on the Internet, cause huge economic damages to their employers.
When it comes to whistle-blowers T Office © works according to the core in Jewish law. It means that T Office © share the view that employees shall in first place be loyal to their employers. Not to their trade union, not to a 3rd part etc etc.
With some exceptions. See FAQ.
banks, creditcard companies, bookmakers and R & D - research and development companies.
Where big money flows, there you find criminals.
Particularly vulnerable to cyber terrorism is state and local government organizations as well as international companies.
E g of this new cyber threath is the Swedish bakery Paus in Stockholm. They have experienced cyber criminality. This happened during a trade union blockade.
The company's Internet pages was hacked and shut down. Their Facebook account was hijacked etc. The police was and are powerless, lacking of will, lacking of IT knowledge and resources.
Petrus Toxy Law Firm auxiliary company T Office © combat problems, before problems become problems. T Office counter-act without public light.
T Office © map out, track down and point out the security risks in your organization.
Petrus Toxy Law Firm ensures dismissals of the safety risks.
My work was requisitioned by a Swedish intelligence unit. The Intelligence unit manager felt that my work saved the unit one (1) year of work.
My personal interests beside law and mapping undemocratic groups, are cryptography, mathematics and theoretical physics.
For us self-taught, Associate of (ISC)² is the entrance to the CISSP and CCFP.
It takes creativity, holistic approach and analytical skills to succeed in ICT Forensics.
24/7 - service.
As my client, you reach T Office 24/7/365. This is done via a private client number.
Within ICT Forensics, ICT Security and IT law, I take assignments worldwide.
ICT Forensics.
T Office are active in all these parts of ICT forensics. During the years T Office speciality have become Memory forensics. The main reason is my (Petrus Toxy) personal interest in malware programming since 80's.
Memory Forensics is arguably the most fruitful, interesting, and provocative realm of digital forensics. Each function performed by an operating system (OS) or application (app) results in specific modifications to the computer’s memory (RAM), which can often persist a long time after the action, essentially preserving them.
Additionally, memory forensics provides unprecedented visibility into the runtime state of the system, such as which processes were running, open network connections, and recently executed commands.
You can extract these artifacts in a manner that is completely independent of the system you are investigating, reducing the chance that malware or rootkits can interfere with your results. Critical data often exists exclusively in memory, such as disk encryption keys, memory-resident injected code fragments, off-the-record chat messages, unencrypted e-mail messages, and non-cacheable Internet history records.
T Office has take the traditional ICT Forensics to next level.
T Office offers preliminary investigations to law firms.
T Office collects digital evidens, find perpetrators and witnesses, and create animations of crime scenes. This is a more advance work than e g Police do.
Which give the defense a stronger plattform defend their client. In this work the key factors are T Office strong knowledge from the Security Industry and the long time knowledge about Offensive Network Security.You find more information here. The side is in Swedish.
ICT Security.
Ex. of malware is: worms, viruses, Trojans, adware, spyware and keyloggers.
There are malware that can be multiple-in-one, so called blended.
Today you can let private companies custom make malware to you.
T Office © is one of these private security companies.
T Office © do reverse engineering and have an own lab. The foundations to what today is T Office © Official Lab was layed 1994 during my economical studies.
The goal with a pentest is to look for security weaknesses in an organization, and access to the computer's functions and data, before bad guys do it.
What does a Pentest Operator do:
The Pentest goals are:
• Investigation and identification of Zero Day Attacks in the Operating System (Windows, Linux, *nix);
• Modbus, OPC protocol eavesdropping using TAP or IP networks (ARP Poisoning Eth Bridging);
• Reverse Engineering of existing threats, research and analysis of threat behavior;
• Writing custom made malware that are not identified by AV;
• Identification of malwares in cellular phones and in the network;
• ICT Forensics. Testing and analysis of work stations and servers, testing of protection and monitoring systems, testing of log files and event analysis of access and data theft;
• and more
• Application tests to the Internet sites of the organization, including, Intranet, Company portal for service providers, and more.
• Communication tests for prevention of access via communication channels to the internet.
• Access to the network via custom made malware such as Trojan horse.
• Access via telephone.
• Eavesdropping on wireless networks.
• Examination of hostile take-over via long-distance work-stations (RAS, Citrix, VPN, Terminal).
• Periodic and permanent monitoring and scanning for alterations in the organization's exposure to the internet.
• Collection of intelligence on internet driven attacks.
.
Red Cell is not the same as Red Team.
Red Cell is an organized mission to physical and / or virtual infiltrate and test an organization security.
It can be for example test the customers physical security and alertness.
The Red Cell will infiltrate the customers organization with different methods.
The Red Cell can for example have as a goal to get industry secrets deep inside the customers organization, or plant symbolic bugs, or do symbolic sabotage etc., to demonstrate how vulnerable the organization is. After the operation the Red Cell will help the customer to fix the security holes in the attack surface and all data mining from the operation will be given back to the customer.
You could call my work as Historian in 90's, 00s, 10s for Red Cell operations.
The goal then was not test an organizations security. The goal in those cases was Data Mining for the best of science, and by extension for the best of Western democracy. Some would also call it the art of infiltration. I (Petrus Toxy) call it science.
Counter-act problems before problems become problems,
Petrus Toxy
/ Petrus Toxy
Founder of T Office © - Offensive Network Security
All rights reserved. © Petrus Toxy 2015.
Hire a lawyer and EH all-in-one, who thinks "outside the box".
Hire Petrus Toxy. I will point out the security attack surface in your organization;
Disloyal employees, whistle blowers and cyber criminals.
T Office © is a proud user of Lua.