E Mail Forensics
E Mail Forensics
Case study
DOI: 10.7251/JIT1802064L UDC: 004.42:004.738.5
Abstract: E-mail has emerged as the most important application on the Internet for communication of messages, delivery of
documents and carrying out transactions and is used not only from computers, but many other electronic gadgets such as mobile
phones. This paper is an attempt to illustrate e-mail architecture from forensics perspective. Also, this paper projects the need for
e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple
tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and
identi ication of its originator. Furthermore, dif iculties that may be faced by investigators during forensic investigation of an e-mail
message have been discussed along with their possible solutions. Our focus is on email header analysis phase offered by the tools.
We examine the capability of a particular tools such as EmailTrackerPro and aid4mail in action. The paper describes the court case
of cyber crime, the so-called identity theft in Internet communication via electronic mail by two business entities. Identity theft of
e-mail addresses and false communications with a foreign company was carried out in order to indicate that a cash transaction of
around EUR 100,000 was paid to the account of NN attackers and not to the account in the domestic Serbian bank.
Keywords: E-mail forensic, header analysis, E-mail message as evidence.
the networks traversed by messages, including the server computers and receiver’s client and server
information on the messaging software and patch- computers with required software and services in-
ing policies of clients and gateways, etc. Over a pe- stalled on each. Besides these, it uses various systems
riod of year’s e-mail protocols have been secured and services of the Internet. The sending and receiv-
through several security extensions and producers, ing servers are always connected to the Internet but
however, cybercriminals continue to misuse it for the sender’s and receiver’s client connects to the In-
illegitimate purposes by sending spam, phishing e- ternet as and when required [2,3]. E-mail is a highly
mails, distributing child pornography, and hate e- distributed service that involves several actors which
mails besides propagating viruses, worms, hoaxes play different roles to accomplish end-to-end e-mail
and Trojan horses. Further, Internet infrastructure exchange [2]. These actors fall under three groups,
misuse through denial of service, waste of storage namely User Actors, Message Handling Service (MHS)
space and computational resources are costing ev- Actors and ADministrative Management Domain
ery Internet user directly or indirectly. (ADMD) Actors. User Actors are Authors, Recipients,
E-mail forensic analysis is used to study the source Return Handlers and Mediators that represent peo-
and content of e-mail message as evidence, identify- ple, organizations or processes that serve as sources
ing the actual sender, recipient and date and time it or sinks of messages. They can generate, modify or
was sent, etc. to collect credible evidence to bring look at the whole message. Message Handling Ser-
criminals to justice [1-5]. This paper is an attempt to vice (MHS) Actors are Originators, Relays, Gateways
illustrate e-mail architecture from forensics perspec- and Receivers which are responsible for end-to-end
tive. It describes roles and responsibilities of differ- transfer of messages. These Actors can generate,
ent e-mail actors and components, itemizes meta- modify or look at only transfer data in the message.
data contained in e-mail headers, and lists protocols ADministrative Management Domain (ADMD) Actors
and ports used in it. It further describes various tools are Edges, Consumers and Transits which are asso-
and techniques currently employed to carry out fo- ciated with different organizations and have their
rensic investigation of an e-mail message. own administrative authority, operating policies and
This paper projects the need for e-mail forensic trust-based decision making [2].
investigation and lists various methods and tools E-mail system is an integration of several hard-
used for its realization. A detailed header analysis of ware & software components, services and protocols,
a multiple tactic spoofed e-mail message is carried which provide interoperability between its users and
out in this paper. It also discusses various possibili- among the components along the path of transfer.
ties for detection of spoofed headers and identi ica- The system includes sender’s client and server com-
tion of its originator. Furthermore, dif iculties that puters and receiver’s client and server computers
may be faced by investigators during forensic inves- with required software and services installed on each
tigation of an e-mail message have been discussed of them. Besides, it uses various systems and services
along with their possible solutions [1,5]. of the Internet [2].
This paper will also discuss tracing e-mail head- The sending and receiving servers are always con-
ers and issues associated with it. It will address both nected to the Internet but the sender’s and receiver’s
HTTP & SMTP initiated e-mails. It will discuss dif- client connects to the Internet as and when required.
ferent ways used by e-mail senders to evade tracing An e-mail communication, for example, between a
and workarounds used by investigators to combat sender ‘Alice’ having e-mail address ‘[email protected]’
them. It will also discuss advanced measures and and recipient ‘Bob’ having e-mail address ‘bob@b.
techniques used by investigators to track emails [4]. com’ is shown in Figure 1.
We will discuss particular tools in the paper, such as: ‘Alice’ composes an e-mail message on her com-
EmailTrackerPro and aid4mail in action. puter called client for ‘Bob’ and sends it to her send-
ing server ‘smtp.a.org’ using SMTP protocol. Sending
E-MAIL SERVICE ARCHITECTURE server performs a lookup for the mail exchange record
E-mail system comprises of various hardware and of receiving server ‘b.org’ through Domain Name Sys-
software components that include sender’s client and tem (DNS) protocol on DNS server [3] ‘dns.b.org’. The
Figure 1. E-mail communication between a sender ‘Alice’ and recipient ‘Bob’ [3]
DNS server responds with the highest priority mail ex- tocols which provide interoperability between its
change server ‘mx.b.org’ for the domain ‘b.org’. Sending users and among the components along the path of
server establishes SMTP connection with the receiving transfer. The e-mail architecture shown in Figure 2
server and delivers the e-mail message to the mailbox below speci ies the relationship between its logical
of ‘Bob’ on the receiving server. ‘Bob’ downloads the components for creation, submission, transmission,
message from his mailbox on receiving server to local delivery and reading processes of an e-mail mes-
mailbox on his client computer using POP3 [3] or IMAP sage. Several communicating entities called e-mail
[1] protocols. Optionally, ‘Bob’ can also read the mes- nodes which are essentially software units working
sage stored in his server mailbox without download- on application layer of TCP/IP model are involved
ing it to the local mailbox by using a Webmail program. in the process of e-mail delivery. Nodes working on
E-mail system is an integration of several hard- lower layers such as routers and bridges which rep-
ware and software components, services and pro- resent options to send e-mail without using SMTP
tom and MIME headers appearing in the body of the Message ID: This is a globally used unique
message are also analysed for sender mailer inger- identi ication ID which refers to the genuine time
prints and software embedded identi iers [2]. of the emails and version of message. It is highly
important to know if investigators want to know
whether spoo ing is done to the email or not.
Relevance of Headers & Components MIME Version: It stands for Multipurpose In-
Email header forensics basically denotes the ex- ternet Mail Extensions and is an Internet Standard
amination done on the email message body and the which extends format of message.
source and path followed by it. This also includes Content-type: This shows the type of con-
the identi ication of genuine sender, time, or recipi- tent or format used for the message like; XLML, Text,
ent of the emails. The email header forensic analy- or HTML.
sis can bring out the candid evidences from various X-Mailer: It displays the email client which is
components included in the header part. Let us see used for sending the message.
Figure 4 which components are helpful for header X-Originating-IP&Received: This is an im-
forensics: portant ield for tracing the IP address used for sending
the email. This is the most important message when it
comes to the email header forensic analysis as it has to
be examined where the mail arrived from.
DKIM-Signature: This ield stores the sig-
nature of an email and all key-fetching information
in simple “tag=value” syntax. It is a crucial ield to
validate the domain name and identity allied to the
message via cryptographic authentication.
A. Authentication system. Users cannot request any mail but them get-
The technique can be used to identify and verify ting number of mails of unintended user which can
if anyone is seeking to access un authorized system. be a SPAM mail. Mail iltering cannot ilter legitimate
B. Access control email from SPAM. Virus and SPAM have negligible
Users can be restricted to ensure they only access difference.
data and services for which they have been autho-
rized. Experiment: Man-in-the-Middle Attack
The main purpose of this experiment is to dem-
C. Encryption onstrate the concept of the man-in-the-middle at-
Techniques that scramble data are used to protect tack, the attacker being an NN person. This experi-
information while data are transmitted over network. ment is aimed at capturing data from a suspected
user to connect to a WLAN and viewing unauthor-
D. Firewall ized content that certainly happened in this court
Firewall is mainly used to differentiate the in- case. The experiment shows that the unauthorized
ternal and external information access. Firewall content accessed by the suspicious user can be col-
prevents the outsiders to access information within lected and can be used for a digital forensic investi-
organization. gation. The reader should take into account that all
three actors in this experiment, i.e. router, attacker
E. Intrusion detection and legitimate user (see Figure 5), all at the same
Techniques that monitor the system and network network address, i.e. 146.64 with the remaining two
to check whether anyone is trying to access network numbers indicating the address of each host in the
without authentication. network.
B. SPAM
SPAM is another major issue in network securi- In spite of this, the experiment would continue
ty. Viruses and SPAM go hand in hand. Spam is also to be successful, even if encryption is established,
known as junk email. SPAM mail contains malicious although in this case more efforts should be made
code which affects mail system immediately. SPAM to crack the passwords irst, but it should be empha-
mail contains virus which can bring down the entire sized that communication encryption continues to
be present as the greatest enemy of forensic scien- analysing them we can decode the message being
tists. sent. After decoding, all IP addresses are analysed
The main idea of this experiment is that the at- and their location is traced. A timeline of all event
tacker uses an ARP spoo ing mechanism to convince is made (in universal standard time) and is checked
the legitimate user that they are a legitimate partici- further for suspicious behaviour. Server logs are
pant, device gateway [4]. After the response of a le- checked at the same time to ensure that all the ac-
gitimate user, the attacker immediately con irms to tivities are mentioned in the timeline so formed. If
the gateway that they are a legitimate user. Both the any suspicious activity is found, the mails are recov-
legitimate user and the gateway will think they have ered and can be used as evidence against the send-
established a relationship with each other, and in er. Email is extracted from the client server which
fact they have both established a relationship with keeps a copy of sent mails until a speci ic number.
the attacker. This means that the gateway and le- First case study
gitimate user traf ic is directed towards an attacker First, we will describe a well-known case in court
who can then intercept the communication between practice i.e. a case study involving the use of Manual
the two sides. For the purpose of this experiment, Method for Email Analysis [4] using a whaling attack
the attacker is only interested in the traf ic of a le- which is a spear-phishing attack directed speci i-
gitimate user suspected of being searched for IM- cally at high-pro ile targets like C-level executives,
PORTANT online content. politicians and celebrities:
• An email attached to a $20 million dollar law-
suit purported to be from the CEO of “tech.
EXAMINING E-MAIL FORENSIC TOOLS: CASE STUDIES com” to a venture capital broker. The message
Email analysis, as we already mention, is the outlined guaranteed “warrants” on the next
task performed in the network forensics. Email round of inding for the broker.
analysis is the process which involves analysis of • “tech.com” illed counter claim and claimed
emails sent and received at different ends. In cur- the email was forgery. Their law irm engaged a
rent era, there are very less ways to analyse emails. team to determine the validity of the message.
Most widely accepted method is the Manual Meth- • The team imaged all of the CEO’s computers at
od of Email Analysis [4,5]. Although there have his of ice and his home. Email server backup
been many attempts into securing e-mail systems, tapes were recalled from the client servers.
most are still inadequately secured. Installing an- • All hard drivers and email servers were
tiviruses, ilters, irewalls and scanners is simply searched for “questioned” message. There
not enough to secure e-mail communication. Some were no traces of any such mail on any of the
common examples of illegitimate uses of emails are hard drive or mail spool.
spam, phishing, cyber bullying, botnets, disclosure • When the time stamps and message id’s were
of con idential information, child pornography and compared with the server logs then it was
sexual harassment. The anonymity factor of e-mail found that the “questioned” message have not
has made it dif icult for digital forensic investiga- gone through either “tech.com’s” webmail or
tors to identify the authorship of an email, and to mail server at the time indicated by the date/
aggravate this problem further; there is no stan- time stamp on the message.
dardised procedure to follow. • Based on the analysis the defendants iled mo-
Therefore, a forensic investigator needs ef icient tion to image and examine broker’s computers.
tools and techniques to perform the analysis with a • Federal judge issued subpoena and the team
high degree of accuracy and in a timely fashion. It is arrived at the broker’s business, he refused to
evident that an email forensic tool may only assist the allow his system to image.
investigator during a speci ic stage of analysis [4,5]. • Broker’s lawyer went into the state court, on a
While preforming manual method for email anal- companion case, and got the judge to issue an
ysis, we try to spot spoofed messages which are sent order for a new court appointed examiner.
through SMTP (Simple Mail Transfer Protocol). By • The examination revealed direct proof of the
alteration of a valid message’s header to create tion and careful scrutiny should be practiced in inves-
a “questioned” email. tigating every part of the e-mail header.
However, this is quite a bit long and tiring proce-
The allegedly received email dure which would involve too many mails to be ana-
The header of a problematic e-mail is presented lysed, which would be excessively time-consuming.
as follows. Time being the most expensive entity, we need to
Return-Path: CEO [email protected] save the time as much as we can. To save this time
Received: from mail.tech.com (mail.tech.com
[201.10.20.152]) certain tools are present which helps to reduce the
by hedgefund.fund.com (8.11.0/8.11.0) ESMTP id work burden. So, we need a software tools, such as
e73MfZ331592; Thu, 3 Aug 2000 15:45:31 -0400 eMailTrackerPro (http://www.emailtrackerpro.
Received: from webmail.tech.com (webmail.
com/) and Aid4Mail Forensic (http://www.aid-
tech.com
[10.27.30.190]) by mail.tech.com (Switch-2.0.1/ 4mail.com/ ) that are discussed in the next section.
Switch-2.0.1) ESMTP id e73MfW903843; Thu, 3 In this case investigator should look at ESMTP
Aug 2000 14:41:32 -0500 id which is a unique identi ication assigned by each
Received: from tech.com (ostrich.tech.com
[10.27.20.190]) intermediate relay or gateway server. This id is usu-
by webmail.tech.com (8.8.8+Sun/8.8.8) with ally in a hexadecimal string that is reset each day.
ESMTP id RAA01318; Thu, 3 Aug 2000 14:41:31 Resulting in an id that can be resolved to a time win-
-0500
content-class: urn:content-classes:message
dow on a particular server. The investigator should
Subject: Warrants on $25 Million Funding also compare the header information against server
Date: Thu, 3 Aug 2000 14:43:47 -0500 logs: [email protected]. Analysis of the web-
MIME-Version: 1.0
mail server logs revealed several issues regarding
Content-Type: application/ms-tnef;
name="winmail.dat" the validity of the suspect message:
Content-Transfer-Encoding: binary • Matching trace header timestamps and ES-
Message-ID: <[email protected]> MTP ids revealed that RAA01318 was issued
X-MS-Has-Attach:
X-MS-TNEF-Correlator: <3989e793.87BDEEE2@ at 17:41:31 to the authentic message
tech.com> • Comparing the 14:41:31 timestamp of the
Thread-Topic: Warrants on $25 Million Funding suspect message with the log revealed the
Thread-Index: AcHatCZUSkaLe0ajEdaelQACpY-
cy8A==
server was assigning ESMTP ids beginning
From: "CEO [email protected]" <ceo_good_guy@ with “OAA” not “RRA” as represented in the
tech.com > header.
To: "Bad_Guy_Broker" <[email protected]>
Analysis of the mail server logs con irmed that
Information contained in the header can aid inves- the suspect message was not authentic:
tigators in tracing the sender of the e-mail. A thorough • Matching trace header timestamps and ES-
investigation of e-mail headers should include exami- MTP ids revealed that the authentic Message-
nation of the sender’s e-mail address and IP address, ID was logged at 17:41:32 and assigned ES-
examination of the message ID as well as the messag- MTP id e73MfW903843 then it was sent to
ing initiation protocol (HTTP or SMTP). To determine the [email protected] server and it
the source of the e-mail, investigators must irst exam- was assigned a new ESMTP id e73MfZ331592
ine the received section at the bottom of the header and • Comparing the 14:41:32 timestamp of the
work their way up in a bottom to top approach. suspect message with the log revealed there
It is also important that e-mail cases examine the were no messages for over an hour during
logs of all servers in the received chain as soon as pos- that time frame.
sible. Time is very important in e-mail cases as HTTP
and SMTP logs are archived frequently; especially by Second case study
large ISPs. If a log is archived, it could take time and This section describes the court case of cyber-
effort to retrieve and decompress the log iles needed crime so called “identity theft in Internet communi-
to trace e-mails. Some e-mails have fake/forged head- cation by electronic mail by two business entities”.
ers in order to deceive investigators, so extreme cau- Based on the analysis of the method of communica-
As far as the hopes through which the message Add4Mail forensic software tool
goes, we can see that it is a little unusual that ev- This is another tool developed for helping in the
erything is going from Italy, going to the server in mail sorting purpose only. This software can ind
Slovakia, to the US (forged email address of xxxxx@ emails which can be searched by any particular
yahoo.com), then back to Italy and then to Austra- keyword. As with EmailTrackerPro and on this tool,
lia. The following Figure 7 will show the path on the we need to con igure our mail. Let us choose which
map as the message was traveling. mail we will use for analysis. In this case, we will use
gmail. Once we have completed the mail con igura-
tion, we are going to the next step that allows us to
select the time frame in which we want to search for
mail by keywords, and in the window where Vaccky,
Acknowledgements
This research was inancially supported by the Ministry of Science
and Technological Development of the Republic of Serbia, as part of
Figure 9. Example of processing mail by Add4Mail the TR35026 "Software Environment for the optimal management
of the quality software development process" project.
The major disadvantage of this software is that
it can only ind keywords that the user searches. It
has no arti icial intelligence and therefore is a com-
pletely manual software program developed to sort
and ind mails.
REFERENCES [4] Lazic Lj (2018) E-Mail Forensics: The Case From The
[1] Al-Zarouni M (2004) Tracing E-mail Headers, Australian Court Practice Of Theft Of Identity, Conference: ITeO2018,
Computer, Network & Information Forensics Conference, 28. September, Banjaluka, pp. 368- 383.
pp. 16–30. [5] Mrityunjay UC et al. (2017) Novel Approach for Email Fo-
[2] Banday MT (2011) Analysing E-Mail Headers for Forensic rensics, International Journal of Engineering Research &
Investigation, Journal of Digital Forensics, Security and Technology (IJERT), Special Issue.
Law, Vol. 6(2).
[3] Banday MT (2011) Techniques and Tools for Forensic In- Submitted: November 10, 2018
vestigation of E-mail, International Journal of Network Accepted: November 23, 2018
Security & Its Applications, Vol. 3, No. 6.
FOR CITATION
Ljubomir Lazić, E-Mail Forensics: Techniques And Tools For ForensicInvestigation Of One Court Case, JITA – Journal of Information
Technology and Applications, PanEuropien University APEIRON, Banja Luka, Republika Srpska, Bosna i Hercegovina, JITA 8(2018)
2:64-74, (UDC: 004.42:004.738.5), (DOI: 10.7251/JIT1802064L), Volume 8, Number 2, Banja Luka, december 2018 (45-96), ISSN
2232-9625 (print), ISSN 2233-0194 (online), UDC 004