CF Lecture 10 - Email Forensics
CF Lecture 10 - Email Forensics
Zunera Jalil
Email: [email protected]
Emails 2
• Risks are associated with corporate mail, and far greater risks
are associated with Web mail.
• In corporate mail environments, a user who intends to sneak
data out of the company can attach a file to their outgoing
message and send the file to any number of people,
including competitors, ex-coworkers, or even foreign
nationals.
• We can track such activity via the corporate mail server.
Email Investigations 4
• “Chain letters” are another form of abuse that is seamlessly migrated from
the physical world to cyberspace.
• A chain letter is an e-mail that was sent progressively from e-mail user to
email user.
It will generally instruct the recipient to circulate further copies of the
email and usually to multiple recipients.
These chain letters often promise rewards or spiritual gain if the e-mail
was sent and may also threaten loss or harm if the recipient does not
forward it.
• The authenticity of a chain letter often cannot be verified because the
header information from the original sender has been lost in retransmission
Fake Email 19
• Sending Fake E-mail is any E-mail that has been falsely created or altered
in some manner.
It is often used as a method to hide the source address in spamming. Email
spoofing is a technique used for forged or fake mail.
Fakemail can be sent by entering someone else's e-mail address in the <From>
or <Reply To> fields. These may also contain information about the origin of the
message.
Fakemail may be created as simply as connecting to TCP port 25 using any
telnet client.
Once this is done, it directly connects the machine to the SMTP (Simple Mail
Transfer Protocol) daemon running on that host. SMTP commands may then be
written to the SMTP daemon, allowing the sending of fake mail.
Investigation of Email Crimes 20
• Examine the e-mail message, copy it, print it, view the e-mail headers,
examine the e-mail headers, examine any attachments, and trace
the e-mail.
• Steps in the investigation process include:
• Examining the email message
• Copying the email message
• Printing the email message
• Examining the e-mail headers
• Examining any attachments
• Tracing the email
Exploring Role of Email in Investigations 21
• Name conventions
Corporate: [email protected]
Public: [email protected]
Everything after @ belongs to the domain name
• Tracing corporate e-mails is easier
Because accounts use standard names the administrator establishes
• Many companies are migrating their e-mail services to the cloud
Investigating E-mail Crimes and Violations
• The MUA (mail user agent)is the email program that is used
to compose and read the email messages at the client
end.
• There are multiple MUAs available such as Outlook express,
Gmail, and Lotus Notes.
Email Architecture 30
• MTA (message transfer agent) the server that receives the message
sent from the MUA.
• Once the MTA receives a message it decodes the header information
to determine where the message is going, and delivers the message
to the corresponding MTA on the receiving machine.
• Every time when the MTA receives the message, it modifies the
header by adding data.
Email Architecture 31
• When the last MTA receives the message, it decodes it and sends to
the receiver’s MUA, so the message can then be seen by the
recipient.
• An email header has multiple pieces of server information, including IP
addresses.
• The receiving MTA which delivers the mail to the recipient is called
MDA (message delivery agent)
32
Email Header 33
Email is made up of three components: the Envelop, the header and the
body of the message:
• The envelop is something an email user never see as it is the internal
process of routing email.
• The body is the part that we see as it’s the actual content of the
message
• The header which identifies routing info of the message, including
sender, recipient, date and subject.
• Some header (FROM, TO, DATE) are mandatory and some optional (SUBJECT
and CC).
• Other headers include sending & receiving time stamps,
Examining Email Headers 34
• Email messages are saved on the client side or left at the server
Microsoft Outlook uses .pst and .ost files
• Most email programs also include an electronic address book,
calendar, task list and memos.
Valuable for investigators
• In web-based e-mail
Messages are displayed and saved as Web pages in the browser’s cache folder.
Many web-based email providers also offer instant messaging services
Examining Additional E-mail Files 38
39
Tracing an Email message 40
• IP address search will give general details only about what is on the
end of that IP address :-
The ISP and organization's name
The IP's host name
The country it's in
The region/state
The city
The latitude and longitude of the location (a best guess)
The area code for that region
Any known services running on that IP
Tracing an Email message 41
• Router logs
Record all incoming and outgoing
traffic
Have rules to allow or disallow traffic
You can resolve the path a transmitted
e-mail has taken
• Firewall logs
Filter e-mail traffic
Verify whether the e-mail passed
through
• You can use any text editor or
specialized tools
Email Investigations Techniques 43
• Header Analysis
analyzing metadata in the email header.
helps to identify the majority of email-related crimes such as Email spoofing, phishing, spam, scams and even internal data
leakages.
• Server Investigation
involves investigating copies of delivered emails and server logs.
Some organizations do provide separate email boxes for their employees with internal mail servers.
Extraction of the entire email box related to the case and the server logs is done.
• Attachment Analysis
Most viruses and malware are sent through email attachments.
For the analysis of suspicious attachments, investigators can upload documents into an online sandbox such as
VirusTotal or Cuckoo to check whether the file is malware or not.
45
46
47
48
49
50
51
Email Forensics Tools 52
• https://www.stellarinfo.com/blog/email-forensics-investigation-guide-for-security-experts/
• https://www.forensicfocus.com/articles/email-forensics-investigation-techniques/
• https://youtu.be/nK5QpGSBR8c