You are on page 1of 4

Network and Information Security (22620)

Practical No. 14 : Trace the origin of email using any tool

I Practical significance

This Trace Email tool can help you do precisely that. It works by examining the header that is a
part of the emails you receive to find the IP address. If you read the IP Lookup page, you'll get a
clear idea of what information an IP address can reveal. A header is the unseen part of every sent
and received email. To find the IP address of a received email you're curious about, open the email
and look for the header details. How you find that email's header depends on the email program
you use.

II Relevant Program Outcome (POs)


PO1 – Basic knowledge
PO2 – Discipline knowledge
PO3 – Experiments and practice
PO7 – Life-long learning

III Competency and practical Skills


“Understand about the email tracker”
This practical is expected to develop the following skills :
1. We have to download any email tracing software.

2. We have to implement software for our use.


3. We have to maintain security of an organization

IV Relevant Course Outcome(s)


Trace origin of email using email tracker pro tool

V Practical outcomes
Trace origin of email.

VI Relevant Affective Domain Related Outcomes


a. Follow precautionary measures
b. Demonstrate working as a leader / a team member
c. Follow ethical practices

Page | 1
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

VII Minimum Theoretical Background

This Trace Email tool can help you do precisely that. It works by examining the header that is a part of
the emails you receive to find the IP address. If you read the IP Lookup page, you'll get a clear idea of
what information an IP address can reveal. A header is the unseen part of every sent and received email.
To find the IP address of a received email you're curious about, open the email and look for the header
details. How you find that email's header depends on the email program you use.

VIII Work situation


 Faculty must form a group of students.
 Faculty will demonstrate the use of email tracing software.

IX Precaution to be followed
1. Handle computer system and peripherals with care
2. Handle software carefully
3. Follow safety precautions
4. Disconnect PCs from these cables and shut down properly

X Resources required (Additional)

SN Instrument/Object Specification Quantity Remarks

01 Desktop PC Processor i3/i5 1 / group Yes

02 Software Email Tracker Pro 1 / group Yes

X Procedure
1. To being tracing a header go to the File menu and click the Trace an email... option as
shown in the image above.

2. The filter dialog box, as shown below, is split into three sections, each of which is explained below the
image.

Page | 2
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

The image above has been split into three sections for your understanding.

1) To trace a header you have to first select the first option, as shown in the image above.
2) The text box shown above is where you have to paste the email header you want to
3) Once the header has been pasted into the Email headers section click the trace button, as
shown in the image above
3. When the trace has finished it will look similar to the image above. The email trace table shows
you each hop between yourself and the email origin, giving you IP addresses, node names and
locations. The trace route is also shown on the map with the final location pin pointed. To the
right hand side you have the email summary, whois information and email header. Simply click
the heading to view each one separately.

Page | 3
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

List of student Team Members

1.
2.
3.
4.

Signature ofTeacher

Page | 4
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati

You might also like