Web Forensics Lecture 8
Web Forensics Lecture 8
8-1 Introduction
The Internet is a very easy way to reach any system. If confidential data is
not properly protected, then it becomes opens to vulnerable access and
misuse. Cyber-crime can cause varying degrees of damage by hackers. So,
detailed forensic analysis is required to come to a conclusion about an
incident and to prove or disprove someone’s guilt.
Some criminal activities like child pornography, hacking, and identity theft
can be traced and the criminals can be punished if proper evidence is found
against them.
Client: The computer that’s receiving or sending the e-mail. Think of the
client as your home mail box.
Server: The computer that’s storing e-mail it receives until the destination
client retrieves them. Think of the server as your local post office where mail
is sent and received.
70
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
According to “Ciber indian web site”, Web based Email accounts are
usually free email accounts that are operated from a website unlike
Outlook Express installed on your hard drive. They are World Wide
Web interfaces that allows users to read and write E-mail using a Web
browser. Webmail is commonly offered as a service by Internet
companies.
They usually offer some email services such as signature, vacation reply
and filters and usually provide less disk space to store messages.
Since they are web based, they are slow, using a browser and require an
Internet connection to read and compose messages, but useful in the case
where you need additional email accounts on a long or short term basis.
Web based email accounts are used extensively by spammers. A clear
disadvantage of web based email accounts is that you can not read
old email or prepare new email offline. You need to be connected to
the Internet to retrieve, read, and send your email messages.
Multiple Folders
Trash folder
Address book / Contact list
Filtering the incoming email to dispatch to related folder
Spam detection and blocking measures (reject/bounce email to
sender with note)
71
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
72
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
73
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
74
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
The expanded mail header has quite a bit more information that’s
needed by routers to deliver the e-mail to its destination. For the most
part, e-mail client software doesn’t show you full headers unless you
specifically ask, and even then you may have to look at the raw e-mail to find
all the headers you’re after.
75
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
time stamps, you see that the e-mail traveled through two e-mail servers to
arrive at its destination.
Figure 9-6 smmarizes the basic e-mail interactions on a Web mail server.
The easiest way to view the contents of a person’s Web mail account
is to get permission from that person. But unlikely that happening.
Instead, you can find data by using forensic methods on the local machine.
Extracting every Web page that a suspect has ever visited would take to view
all those pages into the next decade.
77
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
Web forensic analysis brings out some details like when and in what
sequence did somebody access a Web page.
78
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
If the application doesn’t have the ability to temporarily store files for use
later, it often lets the operating system handle this function via the swap file
or virtual memory.
The swap file is an operating system function that acts like RAM, but
uses the hard drive or storage device instead of memory microchips.
Because the swap file is written and then deleted, the information is still
physically on the storage device and retrievable by you.
79
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
80
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
81
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
server side and client side forensic evidence are sometimes insufficient for
ascertaining التثبتthe occurrence of an activity.
82
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
83
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
Web Server -
Server on which your website is hosted. This server will have installed web
servers such as IIS, apache, etc.
Application Server -
Server on which your created applications which are utilizing your
database, web service, etc. This application server will host business layer
(wrapped with web services), scheduled jobs, windows services, etc.
Database Server -
Database server will have your one or more database hosted such as
Oracle, Sql Server, MySql, etc.
84