SlideShare a Scribd company logo
Phishing Analysis
Ojectives
• Phishing
• Internet Protocol (IP) addresses
• Domain Name System (DNS) names
• Analyse “From” addresses
• Analyse URL’s
• Trace the e-mail
Phishing
• E-mail utilizing social engineering
• Induces the recipient to reveal desired
personal information
• Bank account
• SSN
• Address
• Etc.
• Sometimes entices the recipient to go to a
malicious web site
IP Addressing
• Each interface on a network is assigned a 32-bit IP address
• The address has a prefix and suffix
● Network and host ID
Finding Your IP Address
• Examples
– 3.5.1.193
– 140.211.91.175
– 192.168.0.1
• Finding your own address
– Open a Command window
– Type ipconfig/all on Windows
Opening a
Command
Prompt
Your IP Address
The Easy
Way
Who Owns an IP Address
• Managed by the Internet Assigned Numbers
Authority (IANA)
• Users are assigned IP addresses by Internet
Service Providers (ISPs)
• ISPs obtain allocations of IP addresses from
their appropriate Regional Internet Registry
(RIR)
Regional Internet Registries (RIR)
• APNIC (Asia Pacific Network Information Centre)
• AfriNIC (African Network Information Center)
• ARIN (American Registry for Internet Numbers) –
North America
• LACNIC (Regional Latin-American and Caribbean
IP Address Registry) – Latin America and parts of the
Caribbean
• RIPE NCC (Réseaux IP Européens) – Europe, parts
of the Middle East and Asia
Researching IP Addresses
ARIN
At Your
Finger Tips
Address Geographic Location
URL’s
Uniform Resource Locater
• The name of a web site
• http://www.geobytes.com/IpLocator.htm
• First name – Top Level Domain
.com .biz
.edu .net
.gov .org
.mil .etc
Family Tree
• http://www.geobytes.com/IpLocator.htm
• Second name is the organization’s name
• Third name www is particular web server of
Geobytes
• After the / is the directory and document to
be displayed
• IpLocator.htm
• Default is index.html
Domain Name System
• Associates URL Names to IP addresses
• Examples
– ww.sou.edu = 140.211.107.34
• The Domain Name System (DNS) is a set of
servers that together know all the names
used on the Internet
• More about this later…
Email Schemes/Scams
• Advertisers
• Spammers
• Scammers
• Phishers
• Spear Phishers
E-mail Structure
• To:
• From:
• C:
• BC:
• Subject
• Body
Basic Email Header
Email Header Info
• Header info can be faked
– From
– Reply to
– Return-path
– Subject
– Date
• Don't believe it!
Long Headers
NOT EASY
• Different for each e-mail client
• Sometimes impossible
• www.aeicomputertech.com/forensics_mail_header_info.php
• http://www.abika.com/Reports/Samples/emailheaderguide.htm
• For campus Groupwise
• Open e-mail
• Click on “Message Source”
AOL
1. Open AOL
2. Open the e-mail that you wish to check by
double-clicking it
3. Under the To: line, there should be a “Sent from
the Internet (Details)” line
4. Single left click the word “Details” to open an
Internet Information window
5. This should display the full e-mail header
information
Gmail
1. Log into the Gmail account
2. Open the e-mail message in question
3. To the right of the sender’s e-mail message will be a
“show details” hyperlink and to the right of that is a
“Reply” button (I.e., Reply is the default option at least
of 10/15/2007). To the right of the word “Reply” is a
pipe mark (I.e. |) and a down arrow. Single left-click the
down arrow to display a small window of options.
4. Single left-click the word “show option”
5. The e-mail headers, in their entirety, will now be
displayed in a new window
Hotmail
1. Log into your Hotmail account single left-click
the “View Source” option.
2. Single, right-click the e-mail you wish to inspect
3. Single, ;eft-click the “View Source” option
4. The e-mail will now be displayed in its native
HTML-based format with the e-mail header
information at the very top.
MS Outlook
• Open Microsoft Outlook
• Open the e-mail that you wish to check the mail header information by double-clicking
it
• Looking at the Office 2007 horizontal "ribbon" menu, move your cusor to the "Options"
square
• Underneath the three icons for Categorize, Followup, & Mark as Unread, there is the
word "Options" and to the right of it is a small three-sided square with a diagonal arrow
in it
• Hovering over this miniature icon produces a popup with the wording "Message
Options"
• Single, left-click the miniature icon
• A "Message Options" window will display
• The selected e-mail header information will be at the bottom of the window to the left of
"Internet headers:"
Yahoo!
• Login to the Yahoo! e-mail account in question
• Single, left-click the "Options" hyperlink text from the top menu
• Single, left-click the "General Preferences" hyperlink text
• Scroll down to the Messages section of the page and place a dot in the
second radio button option that reads "Show all headers on incoming
messages"
• Scroll down to the bottom of the page and single, left-click the "Save"
button
• Navigate to and open the e-mail message in question
• The full e-mail header information will now be displaye
Reading Long Header Info
• Check path by looking at “received” list
• Read it upside down (originator is at the
bottom of the list)
• Uses the passive voice, so can be confusing
Actual e-mail
Long Header Example
Real
Spam
Long Headers
Real
Owner
of
IP
Address
Real
Spam
Look for Real Link
Checking
whois
For
URL
Another Example
Just have to
reply to the e-mail
But where do you go?
Not where you think.
Where you think you are going.
Another look at the e-mail
ARIN Whois Result
Go to Afrinic
Check out
Afrinic
Phishing Again
Probably should
not reply to Nigeria
and give them your
bank account number
Summary
• IANA assigns IP addresses
• Regional Registries assign addresses for
regions
• Start with ARIN when researching
– ARIN will tell you where to go for non-
American addresses
• Turn on long headers in email
• Don't fall for silly stuff in the body of the
email

More Related Content

Similar to 8.1.Phishing Analysis.ppt

Session 3 Gmail-Account.ppt
Session 3 Gmail-Account.pptSession 3 Gmail-Account.ppt
Session 3 Gmail-Account.ppt
jaspreetkaur908049
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training Phishing
Atl Edu
 
Intro to email for seniors
Intro to email for seniorsIntro to email for seniors
Intro to email for seniors
Catherine DeBerry
 
Internet
InternetInternet
Internet
Gulfam Hussain
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
Dave Archer
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
Raviteja Chowdary Adusumalli
 
Phishing
PhishingPhishing
Phishing
Alka Falwaria
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
Lisa Lindsay
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
ShreyaKushwaha28
 
Email hacking
Email hackingEmail hacking
Email hacking
ShreyaBhoje
 
Tips and Tricks to Stay Out of the Spam Folder
Tips and Tricks to Stay Out of the Spam FolderTips and Tricks to Stay Out of the Spam Folder
Tips and Tricks to Stay Out of the Spam Folder
SendGrid
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
jatin batra
 
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
Yahoo Developer Network
 
(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity
BayCHI
 
Internet literacy and safety
Internet literacy and safetyInternet literacy and safety
Internet literacy and safety
Social Development Centre Waterloo Region
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
Shyam Pareek
 
email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahoo
Lisa Lindsay
 
Internet basics
Internet basicsInternet basics
EMail.pdf
EMail.pdfEMail.pdf
EMail.pdf
Ronald Speener
 
Searching the Internet
Searching the InternetSearching the Internet
Searching the Internet
haroldtaylor1113
 

Similar to 8.1.Phishing Analysis.ppt (20)

Session 3 Gmail-Account.ppt
Session 3 Gmail-Account.pptSession 3 Gmail-Account.ppt
Session 3 Gmail-Account.ppt
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training Phishing
 
Intro to email for seniors
Intro to email for seniorsIntro to email for seniors
Intro to email for seniors
 
Internet
InternetInternet
Internet
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Phishing
PhishingPhishing
Phishing
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Email hacking
Email hackingEmail hacking
Email hacking
 
Tips and Tricks to Stay Out of the Spam Folder
Tips and Tricks to Stay Out of the Spam FolderTips and Tricks to Stay Out of the Spam Folder
Tips and Tricks to Stay Out of the Spam Folder
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
 
(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity
 
Internet literacy and safety
Internet literacy and safetyInternet literacy and safety
Internet literacy and safety
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
 
email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahoo
 
Internet basics
Internet basicsInternet basics
Internet basics
 
EMail.pdf
EMail.pdfEMail.pdf
EMail.pdf
 
Searching the Internet
Searching the InternetSearching the Internet
Searching the Internet
 

Recently uploaded

State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Fernanda Palhano
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
zsjl4mimo
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 

Recently uploaded (20)

State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 

8.1.Phishing Analysis.ppt

  • 2. Ojectives • Phishing • Internet Protocol (IP) addresses • Domain Name System (DNS) names • Analyse “From” addresses • Analyse URL’s • Trace the e-mail
  • 3. Phishing • E-mail utilizing social engineering • Induces the recipient to reveal desired personal information • Bank account • SSN • Address • Etc. • Sometimes entices the recipient to go to a malicious web site
  • 4. IP Addressing • Each interface on a network is assigned a 32-bit IP address • The address has a prefix and suffix ● Network and host ID
  • 5. Finding Your IP Address • Examples – 3.5.1.193 – 140.211.91.175 – 192.168.0.1 • Finding your own address – Open a Command window – Type ipconfig/all on Windows
  • 9. Who Owns an IP Address • Managed by the Internet Assigned Numbers Authority (IANA) • Users are assigned IP addresses by Internet Service Providers (ISPs) • ISPs obtain allocations of IP addresses from their appropriate Regional Internet Registry (RIR)
  • 10. Regional Internet Registries (RIR) • APNIC (Asia Pacific Network Information Centre) • AfriNIC (African Network Information Center) • ARIN (American Registry for Internet Numbers) – North America • LACNIC (Regional Latin-American and Caribbean IP Address Registry) – Latin America and parts of the Caribbean • RIPE NCC (Réseaux IP Européens) – Europe, parts of the Middle East and Asia
  • 14. URL’s Uniform Resource Locater • The name of a web site • http://www.geobytes.com/IpLocator.htm • First name – Top Level Domain .com .biz .edu .net .gov .org .mil .etc
  • 15. Family Tree • http://www.geobytes.com/IpLocator.htm • Second name is the organization’s name • Third name www is particular web server of Geobytes • After the / is the directory and document to be displayed • IpLocator.htm • Default is index.html
  • 16. Domain Name System • Associates URL Names to IP addresses • Examples – ww.sou.edu = 140.211.107.34 • The Domain Name System (DNS) is a set of servers that together know all the names used on the Internet • More about this later…
  • 17. Email Schemes/Scams • Advertisers • Spammers • Scammers • Phishers • Spear Phishers
  • 18. E-mail Structure • To: • From: • C: • BC: • Subject • Body
  • 20. Email Header Info • Header info can be faked – From – Reply to – Return-path – Subject – Date • Don't believe it!
  • 21. Long Headers NOT EASY • Different for each e-mail client • Sometimes impossible • www.aeicomputertech.com/forensics_mail_header_info.php • http://www.abika.com/Reports/Samples/emailheaderguide.htm • For campus Groupwise • Open e-mail • Click on “Message Source”
  • 22. AOL 1. Open AOL 2. Open the e-mail that you wish to check by double-clicking it 3. Under the To: line, there should be a “Sent from the Internet (Details)” line 4. Single left click the word “Details” to open an Internet Information window 5. This should display the full e-mail header information
  • 23. Gmail 1. Log into the Gmail account 2. Open the e-mail message in question 3. To the right of the sender’s e-mail message will be a “show details” hyperlink and to the right of that is a “Reply” button (I.e., Reply is the default option at least of 10/15/2007). To the right of the word “Reply” is a pipe mark (I.e. |) and a down arrow. Single left-click the down arrow to display a small window of options. 4. Single left-click the word “show option” 5. The e-mail headers, in their entirety, will now be displayed in a new window
  • 24. Hotmail 1. Log into your Hotmail account single left-click the “View Source” option. 2. Single, right-click the e-mail you wish to inspect 3. Single, ;eft-click the “View Source” option 4. The e-mail will now be displayed in its native HTML-based format with the e-mail header information at the very top.
  • 25. MS Outlook • Open Microsoft Outlook • Open the e-mail that you wish to check the mail header information by double-clicking it • Looking at the Office 2007 horizontal "ribbon" menu, move your cusor to the "Options" square • Underneath the three icons for Categorize, Followup, & Mark as Unread, there is the word "Options" and to the right of it is a small three-sided square with a diagonal arrow in it • Hovering over this miniature icon produces a popup with the wording "Message Options" • Single, left-click the miniature icon • A "Message Options" window will display • The selected e-mail header information will be at the bottom of the window to the left of "Internet headers:"
  • 26. Yahoo! • Login to the Yahoo! e-mail account in question • Single, left-click the "Options" hyperlink text from the top menu • Single, left-click the "General Preferences" hyperlink text • Scroll down to the Messages section of the page and place a dot in the second radio button option that reads "Show all headers on incoming messages" • Scroll down to the bottom of the page and single, left-click the "Save" button • Navigate to and open the e-mail message in question • The full e-mail header information will now be displaye
  • 27. Reading Long Header Info • Check path by looking at “received” list • Read it upside down (originator is at the bottom of the list) • Uses the passive voice, so can be confusing
  • 36. Another Example Just have to reply to the e-mail But where do you go? Not where you think.
  • 37. Where you think you are going.
  • 38. Another look at the e-mail
  • 39. ARIN Whois Result Go to Afrinic
  • 41. Phishing Again Probably should not reply to Nigeria and give them your bank account number
  • 42. Summary • IANA assigns IP addresses • Regional Registries assign addresses for regions • Start with ARIN when researching – ARIN will tell you where to go for non- American addresses • Turn on long headers in email • Don't fall for silly stuff in the body of the email