>> EXECUTIVE_SUMMARY

Having established the legal frameworks (ACPO, NIST) in the previous chapter, this investigation applies those principles to a real-world scenario. The primary objective was to confirm illicit activity on a seized laptop while maintaining a strict chain of custody.

1. Evidence Acquisition

The evidence media was ingested into Autopsy 4.21.0. A hash verification (MD5) was performed to ensure the integrity of the image file matched the original seizure.

2. Forensic Findings

01
User Attribution

Registry analysis (`SAM` hive) identified the primary user account as "Mr. Evil". Additional cross-referencing with an `Irunin.ini` file linked this alias to a real name: "Gref Schardt".

Irunin.ini Evidence
FIG 1.20: Irunin.ini File (User Attribution)
02
Network Reconnaissance

Device analysis revealed a Xircom CardBus Ethernet adapter. MAC address analysis confirmed the vendor OUI, linking physical hardware to network logs.

Xircom Network Configuration
FIG 1.23: Xircom Card Configuration
03
IRC & Hacking Communities

Artifacts from the mIRC client were recovered. Logs showed the user participating in an "ORC" channel, discussing hacking techniques and script usage.

IRC Logs
FIG 1.28: mIRC Nicknames
04
Deleted Artifact Recovery

Autopsy's File System analysis recovered 730 deleted files. Critical executables were found hidden in the Recycle Bin (`DC1.txt`, `DC2.exe`), attempting to evade simple directory listings.

Deleted Files
FIG 1.36: Report of 730 Deleted Files

3. Technical Analysis

A deep dive into the Packet Capture (PCAP) files found on the desktop (`ethereal` captures) showed the user intercepting traffic from a Windows CE device accessing `mobile.msn.com`. This indicates active network sniffing and Man-in-the-Middle (MitM) attempts.

Furthermore, the presence of these tools typically triggers antivirus alerts, but the suspect had disabled system defenses, a common behavior in offensive security operations.

4. Conclusion

The investigation successfully attributed the system to the suspect "Gref Schardt" (Mr. Evil) and established a pattern of behavior consistent with black-hat hacking: tool acquisition, community discussion (IRC), concealment (Recycle Bin), and active execution (Network Sniffing). The chain of custody was maintained throughout, making these findings admissible.

NEXT CHAPTER >> BUILDING DEFENSES

Closing the Holes:
Deploying IDS/IPS (Snort & Fail2ban) ↗