SlideShare a Scribd company logo
1 of 17
Email Analysis
View message Header in Mail
MS OutLook:
Open the message in MS Outlook.
Now go to "View" => "Message Options" - "Info" - "Properties".
Look at "Internet Headers".
Yahoo! Mail Webmail:
Open the message (click on it).
Click on "Actions" and select "View Full Header".
Google Mail (Gmail) Webmail:
Open the message (click on it). Click on the "down-arrow" on the top-right of the
message and select "Show Original".
Now you will see the complete message source.
Email Header Analysis
Email Header Analysis
Analysis done on 7 stages:
1. Origination date field
2. Originator Fields
3. Destination Address Fields
4. Identification Fields.
5. Information Fields.
6. Trace Fields.
7. Security fields.
NOTE: Email headers should always be read from Bottom to Top (HOPS)
Email Header Analysis
1. Originated Date Fields
Field Name Field Description
Date
It holds date and time when message is available to delivery from source to
destination
Email Header Analysis
2. Originator Fields
Field Name Field Description
From Name and Email of the author of the message.
Sender
Behalf of author the agent is responsible for the actual transmission
Of the message.
Reply-to The author would like recipients to use for replies
Email Header Analysis
3. Destination Address Fields
Field Name Field Description
To This field contains Address of the Primary Recipient.
Cc Carbon Copy contains the addresses of the others who are to receive the message.
Bcc
Blind Carbon Copy contains addresses of recipients of the message whose addresses
are not to be revealed to other recipients of the message.
Email Header Analysis
4. Identification Fields
Field Name Field Description
Message-ID An unique identification string is generated when it is sent.
In-Reply-to
It Contains Message-ID of the Original Message in Response to which the Reply
message is sent.
References Identifies other documents related to this message, such as other e-mail message.
Email Header Analysis
5. Information Fields
Field Name Field Description
Subject It describes the subject or topic of the message.
Comments It contains the summarized comments regarding the message.
keywords It contains comma separated keywords that may be useful to the recepients.
Email Header Analysis
6. Trace Fields
Field Name Field Description
Return-path It contains the address recorded by MDA from Mail-Form SMTP command
Received
It contains trace information the includes Originating host, mediators and MSA host
domain names or IP address.
MDA : Mail Delivery Agent.
SMTP: Simple Mail Transfer Protocol.
Email Header Analysis
7. Security Fields
Field Name Field Description
Received-SPF SPF validation results for a domain and its mail-servers.
DKIM Signature
The signature of the header is stored in DKIM signature header field. The header
field contains all of the signature and key fetching data.
DMARC
It verifies that a sender’s email messages are protected by both SPF and DKIM,
It provides a way for the receiving server to report back to the sender about
messages that pass and/or fail the DMARC evaluation.
SPF: Sender Policy Framework
DKIM: Domain Key Identification Mail
DMARC: Domain-based Message Authentication, Reporting and Conformance.
Possibility of Attacks
Possibility of Email Attacks
These include
1. Abuses like spamming, phishing, cyber bullying, child pornography, sexual
harassment, racial vilification, etc.,
2. Misuse by transmitting viruses, worms, Trojan horses, hoaxes, and other malicious
programs with an intent to spread them over Internet, and
3. Carry out Internet infrastructure crimes through Denial of Services and Directory
Harvesting Attacks.
Techniques used for Email Attacks
Techniques used for Email Attacks
1. Spoofing.
2. Unauthorized networks.
3. Open Mail Relays.
4. Re-Mailers.
5. Open Proxy.
6. SSH-Tunnel or Port-Redirector.
7. Botnets.
8. Untraceable internet connections.
Tools used for Header analysis
1. G Suite Toolbox Message header.
2. Mx Toolbox.
3. What Is My IP?
4. Mailheader.org.
Thank you

More Related Content

Similar to Email analysis

How to Trace an E-mail Part 1
How to Trace an E-mail Part 1How to Trace an E-mail Part 1
How to Trace an E-mail Part 1
Lebowitzcomics
 
Information Systems Security3Information Systems Secur.docx
Information Systems Security3Information Systems Secur.docxInformation Systems Security3Information Systems Secur.docx
Information Systems Security3Information Systems Secur.docx
jaggernaoma
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
dpd
 
KingsleyUsen_SRS_Gmail
KingsleyUsen_SRS_GmailKingsleyUsen_SRS_Gmail
KingsleyUsen_SRS_Gmail
Kingsley Usen
 
Chapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docxChapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docx
bartholomeocoombs
 

Similar to Email analysis (20)

How to Trace an E-mail Part 1
How to Trace an E-mail Part 1How to Trace an E-mail Part 1
How to Trace an E-mail Part 1
 
Outlook 2013 lesson 2 Overview presentation
Outlook 2013 lesson 2 Overview presentationOutlook 2013 lesson 2 Overview presentation
Outlook 2013 lesson 2 Overview presentation
 
Chapter 8 E-Mail
Chapter 8 E-MailChapter 8 E-Mail
Chapter 8 E-Mail
 
Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016
 
Email spamming
Email spammingEmail spamming
Email spamming
 
Information Systems Security3Information Systems Secur.docx
Information Systems Security3Information Systems Secur.docxInformation Systems Security3Information Systems Secur.docx
Information Systems Security3Information Systems Secur.docx
 
E-mails and Attachments
E-mails and AttachmentsE-mails and Attachments
E-mails and Attachments
 
English Persentation Email
English Persentation EmailEnglish Persentation Email
English Persentation Email
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
 
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptxEMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
EMAIL INTRODUCTION (ALL FEATURES INCLUDED).pptx
 
Online Assignment
Online AssignmentOnline Assignment
Online Assignment
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
 
Computer network
Computer networkComputer network
Computer network
 
Lecture19
Lecture19Lecture19
Lecture19
 
The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
 
Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
KingsleyUsen_SRS_Gmail
KingsleyUsen_SRS_GmailKingsleyUsen_SRS_Gmail
KingsleyUsen_SRS_Gmail
 
Chapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docxChapter 10Email Forensics1Email is Often the Bes.docx
Chapter 10Email Forensics1Email is Often the Bes.docx
 

Recently uploaded

Recently uploaded (20)

TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 

Email analysis

  • 2. View message Header in Mail MS OutLook: Open the message in MS Outlook. Now go to "View" => "Message Options" - "Info" - "Properties". Look at "Internet Headers". Yahoo! Mail Webmail: Open the message (click on it). Click on "Actions" and select "View Full Header". Google Mail (Gmail) Webmail: Open the message (click on it). Click on the "down-arrow" on the top-right of the message and select "Show Original". Now you will see the complete message source.
  • 4. Email Header Analysis Analysis done on 7 stages: 1. Origination date field 2. Originator Fields 3. Destination Address Fields 4. Identification Fields. 5. Information Fields. 6. Trace Fields. 7. Security fields. NOTE: Email headers should always be read from Bottom to Top (HOPS)
  • 5. Email Header Analysis 1. Originated Date Fields Field Name Field Description Date It holds date and time when message is available to delivery from source to destination
  • 6. Email Header Analysis 2. Originator Fields Field Name Field Description From Name and Email of the author of the message. Sender Behalf of author the agent is responsible for the actual transmission Of the message. Reply-to The author would like recipients to use for replies
  • 7. Email Header Analysis 3. Destination Address Fields Field Name Field Description To This field contains Address of the Primary Recipient. Cc Carbon Copy contains the addresses of the others who are to receive the message. Bcc Blind Carbon Copy contains addresses of recipients of the message whose addresses are not to be revealed to other recipients of the message.
  • 8. Email Header Analysis 4. Identification Fields Field Name Field Description Message-ID An unique identification string is generated when it is sent. In-Reply-to It Contains Message-ID of the Original Message in Response to which the Reply message is sent. References Identifies other documents related to this message, such as other e-mail message.
  • 9. Email Header Analysis 5. Information Fields Field Name Field Description Subject It describes the subject or topic of the message. Comments It contains the summarized comments regarding the message. keywords It contains comma separated keywords that may be useful to the recepients.
  • 10. Email Header Analysis 6. Trace Fields Field Name Field Description Return-path It contains the address recorded by MDA from Mail-Form SMTP command Received It contains trace information the includes Originating host, mediators and MSA host domain names or IP address. MDA : Mail Delivery Agent. SMTP: Simple Mail Transfer Protocol.
  • 11. Email Header Analysis 7. Security Fields Field Name Field Description Received-SPF SPF validation results for a domain and its mail-servers. DKIM Signature The signature of the header is stored in DKIM signature header field. The header field contains all of the signature and key fetching data. DMARC It verifies that a sender’s email messages are protected by both SPF and DKIM, It provides a way for the receiving server to report back to the sender about messages that pass and/or fail the DMARC evaluation. SPF: Sender Policy Framework DKIM: Domain Key Identification Mail DMARC: Domain-based Message Authentication, Reporting and Conformance.
  • 13. Possibility of Email Attacks These include 1. Abuses like spamming, phishing, cyber bullying, child pornography, sexual harassment, racial vilification, etc., 2. Misuse by transmitting viruses, worms, Trojan horses, hoaxes, and other malicious programs with an intent to spread them over Internet, and 3. Carry out Internet infrastructure crimes through Denial of Services and Directory Harvesting Attacks.
  • 14. Techniques used for Email Attacks
  • 15. Techniques used for Email Attacks 1. Spoofing. 2. Unauthorized networks. 3. Open Mail Relays. 4. Re-Mailers. 5. Open Proxy. 6. SSH-Tunnel or Port-Redirector. 7. Botnets. 8. Untraceable internet connections.
  • 16. Tools used for Header analysis 1. G Suite Toolbox Message header. 2. Mx Toolbox. 3. What Is My IP? 4. Mailheader.org.