0% found this document useful (0 votes)
69 views34 pages

Email Evidences

Uploaded by

modcosmos69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views34 pages

Email Evidences

Uploaded by

modcosmos69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

Email Evidences

Learning Objectives
By the end of this lecture you will be able to:
• Identify the basic evidence sources for email
activity.
Understanding
01

web based email


3 27-Feb-23
Understanding web-based email
• Web-based email is a service the user accesses with a web browser. Standard webmail
providers are Gmail, Yahoo Mail, and Outlook/Hotmail.

• Some internet service providers also provide an email account that the user can access
with a web browser.

PG. 8 27-Feb-23
Decoding email
02

9 27-Feb-23
Decoding email

Decoding email
• An email has many unique identifiers for a digital forensic investigator to identify and
track down.

• The mailbox and domain name, along with the message ID, will allow a digital forensic
investigator to serve judicially approved subpoenas/search warrants on the vendor to
follow any investigative leads.

PG. 10 27-Feb-23
Decoding email

Understanding the email message format


• The vast majority of email users are only familiar with basic email information, such as
this:

Subject: background checks


Date: 07/19/2008 23:39:57 +0
Sender: [email protected]
Recipients: [email protected]

PG. 11 27-Feb-23
Decoding email

Understanding the email message format


-----HEADERS-----
Return-Path: [email protected]
X-Original-To: [email protected]
Delivered-To: [email protected]
Received: from smarty.dreamhost.com (sd-green-bigip-81.dreamhost.com [208.97.132.81]) by spunkymail-
mx8.g.dreamhost.com (Postfix) with ESMTP id E32634D80F for <[email protected]>; Sat, 19 Jul 2008 16:39:57 -0700 (PDT)
Received: from xy.dreamhostps.com (apache2-xy.xy.dreamhostps.com [208.97.188.9]) by smarty.dreamhost.com
(Postfix) with ESMTP id 6E408EE23D for <[email protected]>; Sat, 19 Jul 2008 16:39:57 -0700 (PDT)
Received: by xy.dreamhostps.com (Postfix, from userid 558838) id 64C683B1DAE; Sat, 19 Jul 2008 16:39:57 -0700 (PDT)
To: [email protected] From: [email protected]
subject: background checks
Message-Id: [email protected]
Date: Sat, 19 Jul 2008 16:39:57 -0700 (PDT)

PG. 12 27-Feb-23
Decoding email

Understanding the email message format


• The email header shows where the email originated from and what servers it touched
upon. Starting from the bottom, we can see the Message-Id field:

• Message-Id: <[email protected]>

PG. 13 27-Feb-23
Decoding email

Understanding the email message format


The following two Received lines identify the subsequent servers on the path to the destination:

Received: from smarty.dreamhost.com (sd-green-bigip-81.dreamhost.com


[208.97.132.81])
by spunkymail-mx8.g.dreamhost.com (Postfix) with ESMTP id E32634D80F for
<[email protected]>;
Sat, 19 Jul 2008 16:39:57 -0700 (PDT)Received: from xy.dreamhostps.com (apache2-
xy.xy.dreamhostps.com [208.97.188.9])
by smarty.dreamhost.com (Postfix) with ESMTP id 6E408EE23D for <[email protected]>;
Sat, 19 Jul 2008 16:39:57 -0700 (PDT)

PG. 14 27-Feb-23
Decoding email

Understanding the email message format


There are optional fields that you may come across in your investigations.
These fields typically start with an X–

X-Priority: 3
X-Mailer: PHPMailer 5.2.9 (https://github.com/PHPMailer/PHPMailer/)
Message-Id: [email protected]
X-Report-Abuse: Please forward a copy of this message, including all headers, to [email protected]
X-Report-Abuse: You can also report abuse here:
http://mandrillapp.com/contact/abuse?id=30514476.1925a088d66f450cb25a4034f3ec6942 X-Mandrill-User:
md_30514476

PG. 15 27-Feb-23
Decoding email

Understanding the email message format


• A note about IP addresses: there are two different types of IPv4 addresses: public and
private. You may see both in the email header.

• 10.X.X.X
• 127.X.X.X
• 172.16.X.X
• 192.168.X.X

PG. 16 27-Feb-23
Decoding email

Email attachments
• MIME is the acronym for Multipurpose Internet Mail Extensions
• Internet standard for allowing emails to accept text other than ASCII, binary
attachments, multi-part message bodies, and non-ASCII base header information.
• MIME indicated with the following:

MIME-Version: 1.0

PG. 17 27-Feb-23
Email Analysis (I)
• Frequently the contents of emails are encoded, mainly to allow special characters to
be used in email messages. Standard emails only allow 7-bit characters:
so if foreign or special characters or non-text attachments (i.e. audio, video, images,
programs etc.) are required in an email, the email must be encoded.
• The MIME (Multipurpose Internet Mail Extensions) standard defines how this
encoding is to be done.
• The encoding method is listed in the email header.
MIME-Version: 1.0
Content-type: text/plain
• This states that the email is encoded to MIME 1.0 standard and the Internet Media
Type (AKA MIME type) is ‘text/plain’.

PG. 18 27-Feb-23
Email Analysis (II)
• Default Internet media type is text/plain - the default - text-only email.
• Other possible Internet media types exist (e.g.):
• text/html - html formatted email,
• multipart/mixed - text plus attachments.
• The content-transfer-encoding header is also defined:
• Governs the actual encoding scheme to be used.
• The most common encodings are:
• 7bit - ASCII only (i.e. 7 bit only),
• quoted-printable (encodes non-ASCII bytes as ‘=hh’, where h is a hex digit),
• base64 - typically used for non-ASCII data such as programs - looks like random
characters - is 4/3 larger than original.

PG. 19 27-Feb-23
Email Analysis (III)
• 7bit and quoted-printable formats will
display at least some of their content
in human readable form.
• Base64 is a way of representing
binary data in an ASCII string.
• base64 is not human readable, but
can be converted/decoded (either
using a forensic tool or by other
standalone or online decoders) e.g.

https://www.opinionatedgeek.com/codecs/base64encoder

PG. 20 27-Feb-23
Email Analysis – Base64 Decoding
• Example
Understanding
03

client-based
email analysis
22 27-Feb-23
Understanding
client-based email
analysis

Understanding client-based email analysis


• A user has access to many email clients to retrieve, read, and send emails.

• Depending on whether you’re in the consumer or commercial environment, you may


encounter different email clients.

• In the consumer market, you will find that Microsoft Outlook/Outlook Express will
prevail because it is preinstalled on the system

PG. 23 27-Feb-23
Understanding
client-based email
analysis

Exploring Microsoft Outlook/Outlook Express


• Outlook stores email information in several file types, such as pst, .mdb, and .ost. We
will find the PST file on the user's hard disk at the following path:

\Users\$USER$\AppData\Local\Microsoft\Outlook

PG. 24 27-Feb-23
Understanding
client-based email
analysis

Exploring Microsoft Windows Live Mail


• Starting with Windows Vista and Windows 7, Windows Live became the default email
client shipping with the Windows operating system.

• The client stores email messages in the following path:

\Users\$USER$\AppData\Local\Microsoft\Windows Live Mail

PG. 25 27-Feb-23
Understanding
client-based email
analysis

Exploring Microsoft Windows Live Mail

PG. 26 27-Feb-23
Understanding
client-based email
analysis

Mozilla Thunderbird
• Thunderbird is a free, open-source email client provided by Mozilla.

• Thunderbird will store emails within a .MBOX file.

• The MBOX format is a generic term for a family of file formats used to store emails. It
will keep all the emails from folder into a singular database file. By default, the
examiner can find the MBOX file in the following path:

$USERNAME$\AppData\Roaming\Thunderbird\Profiles

PG. 27 27-Feb-23
Understanding
client-based email
analysis

Mozilla Thunderbird

PG. 28 27-Feb-23
Understanding
client-based email
analysis

Mozilla Thunderbird
When we look in the folder, we will see the following files:

Archive.msf INBOX.msf
Archives.msf msgFilterRules.dat
Bulk Mail.msf Sent-1.msf
Draft.msf Sent.msf
Drafts.msf Templates.msf
INBOX Trash.msf

PG. 29 27-Feb-23
Understanding
client-based email
analysis

Mozilla Thunderbird

PG. 30 27-Feb-23
Understanding
04

WebMail analysis
31 27-Feb-23
Understanding
WebMail analysis

Understanding WebMail analysis


• Web-based email has become increasingly popular as we transition from the twentieth
to the twenty-first century.

• It’s easy to access, requires little to no configuration from the user, and is available
from any computer.

• WebMail is just another internet artifact for conducting browser analysis

PG. 32 27-Feb-23
Understanding
WebMail analysis

Understanding WebMail analysis


• Suppose the digital forensic investigator wants to investigate the user's use of web-
based email.

• In that case, they will have to analyze the temporary internet files or the internet
cache on the user's system.

• The temporary internet files/cache contains images, text, or any web page component
the user has viewed in their browser.

PG. 33 27-Feb-23
Understanding
WebMail analysis

Understanding WebMail analysis


• Before look into the cache, look into the internet history of the installed browser to see
if the user has accessed web-based email.

• For the Chrome browser, you will find the history stored in a SQLite database named
History at the following path:

$USER$\AppData\Local\Google\Chrome\User Data\Default

PG. 34 27-Feb-23
Understanding
WebMail analysis

Understanding WebMail analysis

PG. 35 27-Feb-23
Understanding
WebMail analysis

Understanding WebMail analysis


• The examiner can find the cache and history for the Firefox browser at the following
location:

$USERS$\AppData\Local\Mozilla\Firefox\Profiles\<profile>\cache2

PG. 38 27-Feb-23
Summary
• Email and Internet evidence is often vitally important to a case.
• Emails sent and received and sites visited give valuable
clues to a user’s motives and modus operandi.
• You are strongly advised to try out as many analysis techniques as you can
- practice is the only way to get familiar with the material.
• Browser Forensics is valuable tool in a forensicator’s
arsenal.

PG. 41 27-Feb-23
Thanks
00

PG. 42 27-Feb-23

You might also like