Professional Documents
Culture Documents
Email Tracing
Email Tracing
Computer Forensics
Email Investigations: Overview
Email has become a primary means of communication.
Email can easily be forged.
Email can be abused
Spam
Aid in committing a crime …
Threatening email, …
Email Investigations: Overview
Email evidence:
Is in the email itself
Header
Contents
In logs:
Left behind as the email travels from sender to recipient.
Law enforcement uses subpoenas to follow the trace.
System ads have some logs under their control.
Notice: All fakemailing that you will be learning can be easily traced.
Email Fundamentals
Email travels from originating computer to the receiving
computer through email servers.
All email servers are being added to the header.
Email Fundamentals
Typical path of an email message:
Mail Server
Client
Mail Server
Client
Mail Server
Email Fundamentals:
Important Services
Verification of IP addresses:
Regional Internet Registry
o APNIC (Asia Pacific Network Information Centre).
o ARIN (American Registry of Internet Numbers).
o LACNIC Latin American and Caribbean IP address
Regional Registry.
o RIPE NCC (Réseau IP Européens Network Coordination
Centre).
Whois - (pronounced as the phrase "who is") is a query and
response protocol that is widely used for querying databases that
store the registered users or assignees of an Internet resource,
such as a domain name, an IP address block or an autonomous
system, but is also used for a wider range of other information.
Email Fundamentals:
Important Services
Domain Name System (DNS) translates between domain
names and IP address.
Name to address lookup.
HOSTS files can be altered.
You can use this as a low-tech tool to block pop-ups.
Local nameservers can/could be tricked into accepting
unsolicited data to be cached.
“Hilary for Senate” – case.
Email Protocols:
A mail server stores incoming mail and distributes it to
the appropriate mail box.
Behavior afterwards depends on type of protocol.
Accordingly, investigation needs to be done at server
or at the workstation.
Email Protocols: