CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
- Dr. Mike Mabey | Spring 2019
CSE 469: Computer and Network Forensics Topic 6: Email Forensics - - PowerPoint PPT Presentation
CSE 469: Computer and Network Forensics Topic 6: Email Forensics Dr. Mike Mabey | Spring 2019 CSE 469: Computer and Network Forensics Email System Components User agents / Webmail: Composing, editing, and reading mail messages. Mail
CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
2
CSE 469: Computer and Network Forensics
3
CSE 469: Computer and Network Forensics
4
CSE 469: Computer and Network Forensics
5
CSE 469: Computer and Network Forensics
6
CSE 469: Computer and Network Forensics
7
CSE 469: Computer and Network Forensics
8
CSE 469: Computer and Network Forensics
9
CSE 469: Computer and Network Forensics
10
CSE 469: Computer and Network Forensics
11
CSE 469: Computer and Network Forensics
12
CSE 469: Computer and Network Forensics
13
CSE 469: Computer and Network Forensics
14
CSE 469: Computer and Network Forensics
15
CSE 469: Computer and Network Forensics
16
CSE 469: Computer and Network Forensics
17
CSE 469: Computer and Network Forensics
18
CSE 469: Computer and Network Forensics
19
CSE 469: Computer and Network Forensics
20
CSE 469: Computer and Network Forensics
21
CSE 469: Computer and Network Forensics
22
CSE 469: Computer and Network Forensics
23
CSE 469: Computer and Network Forensics
24
CSE 469: Computer and Network Forensics
25
CSE 469: Computer and Network Forensics
26
CSE 469: Computer and Network Forensics
27
CSE 469: Computer and Network Forensics
28
CSE 469: Computer and Network Forensics
29
CSE 469: Computer and Network Forensics
30
CSE 469: Computer and Network Forensics
31
CSE 469: Computer and Network Forensics
32
CSE 469: Computer and Network Forensics
33
CSE 469: Computer and Network Forensics
34
CSE 469: Computer and Network Forensics
35
CSE 469: Computer and Network Forensics
36
CSE 469: Computer and Network Forensics
37
CSE 469: Computer and Network Forensics
38
CSE 469: Computer and Network Forensics 1. Return Path: <forensics@yahoo.com> 2. Delivered To: badguy@jailhouse.com 3. Received (qmail 12780 invoked by uid 0); 08 Dec 2015 08:23:37 -0000 4. Received from unknown (HELO smtp.jailhouse.com) (192.152.64.20) by mail.jailhouse.com with SMTP; 08 Dec 2015 08:23:37 -0000 5. Received from Web4009.mail.yahoo.com (Web4009.mail.yahoo.com [192.218.78.27]) by smtp.jailhouse.com (16.12.6/16/12/6) with SMTP id gBC8[]_AJ005229 for badguy@jailhouse.com; Wed 08 Dec 2015 00:18:21 -0800 6. Message-ID: 20121212082330.40429.qmail@web4009.mail.yahoo.com 7. Received from [10.187.241.199] by Web4009.mail.yahoo.com via HTTP; Web 08 Dec 2015 00:23:30 PST Date: Wed, 08 Dec 2015 00:23:30 -0800 (PST) | MIME-Version: 1.0
Return Path – easily spoofed Recipient’s email address Identifies:
Name and IP address of sending email server Email servers through which this message passed Unique message number IP address of sending server and date/time sent
39
CSE 469: Computer and Network Forensics
Attachments may be identified as well
40
CSE 469: Computer and Network Forensics
41
CSE 469: Computer and Network Forensics
42
CSE 469: Computer and Network Forensics
43
CSE 469: Computer and Network Forensics
information
information
44
CSE 469: Computer and Network Forensics
45
CSE 469: Computer and Network Forensics
46
CSE 469: Computer and Network Forensics
47
CSE 469: Computer and Network Forensics
Folder node Index entry table Folder node table Data block
48
CSE 469: Computer and Network Forensics
49