7
EMAIL FORENSICS

Email Forensics

Embed Size (px)

Citation preview

Page 1: Email Forensics

EMAIL FORENSICS

Page 2: Email Forensics

EXPLORING THE ROLES OF THE CLIENT AND SERVER IN E-MAIL

• E-mail can be sent and received in two environments• Internet• Intranet (an internal network)

• Client/server architecture• Server OS and e-mail software differs

from those on the client side• Protected accounts

• Require usernames and passwords• Name conventions

• Question: Why is tracing corporate emails easier?

Page 3: Email Forensics

INVESTIGATING E-MAIL CRIMES

• Similar to other types of investigations• Goals

• Find who is behind the crime• Collect the evidence• Present your findings• Build a case

• Problems• Faking E-mail – Manipulating Headers, striping headers or burner email account• Spoofing – Presenting an email as someone else’s. First machine receives both fake

and original IP.• Anonymous Remailing – Email server that strips identifying information from the

email message before forwarding it.

Page 4: Email Forensics

OBTAINING E-MAIL MESSAGES

• Access victim’s computer or mobile device to recover the evidence• Using the victim’s e-mail client

• Find and copy evidence in the e-mail• Access protected or encrypted material• Print e-mails

• You may have to recover deleted e-mails• Copying an e-mail message

• Before you start an e-mail investigation• You need to copy and print the e-mail involved in the crime

• You might also want to forward the message as an attachment to another e-mail address• With many GUI e-mail programs, you can copy an e-mail by dragging it to a storage

medium• Or by saving it in a different location

Page 5: Email Forensics

E-MAIL HEADERS

The header of an email message tells you a great deal about the message.

The email header format is RFC 2822. The header keeps a record of the message’s journey as it travels through the communication network.As the message is routed through mail servers each one can add its own IP address.Just like the post office

An email investigation begins with a review of an email message. The message header provides an audit trail of every machine through which the email has passed.

There is a wealth of information in these headers.

Header Must Include

• From – The email address of sender

• Date – The local time and date when the message was written

• Message-ID – An automatically generated field

• In-Reply-To – The message-id of the message that this is a reply to; used to link related messages

Common Header Fields

• To – The email address of recipient

• Subject – Summary of the message topic

• CC – Carbon Copy• BCC – Blind Carbon Copy• Content-Type – Info on

displaying message• Precedence – junk, bulk, etc.• Received – Tracking Information• Reply-To – Address for reply

message

Page 6: Email Forensics

VIEWING E-MAIL HEADERS

• Investigators should learn how to find e-mail headers• GUI clients• Web-based clients

• Become familiar with as many e-mail programs as possible• Often more than one e-mail program is installed

• Outlook• Double-click the message and then click File, Properties• Copy headers• Paste them to any text editor• Save the document as OutlookHeader.txt in your work folder

• Thunderbird• Double-click the message and then click View, Header - All

• Also view source will reveal all the header information as well as the body of the email.

Page 7: Email Forensics

EXAMINING E-MAIL HEADERS• After you open e-mail headers, copy and paste them into a

text document• So that you can read them with a text editor

• Headers contain useful information• The mail piece of information you’re looking

for is the originating e-mail’s IP address• Date and time the message was sent• Filenames of any attachments• Unique message number (if supplied)