Week 5 - Email Forensics
Week 5 - Email Forensics
Week 5 - Email Forensics
WEEK 5
EMAIL FORENSICS
1. Email Structure:
c. Date: The date and time when the email was sent.
Body: The content of the email, which can include text, images, and attachments.
The body may also contain HTML code, links, and embedded objects.
The email server can forward the email through a series of relays until it arrives
at an email server close to the recipient's host. The recipient will receive a
notification stating that an email is available; the recipient will then reach out to
the email server to get the email. Users typically use an email client to access
emails. An email client can use different protocols to access the email.
1. SMTP
Simple Mail Transfer Protocol (SMTP) is the protocol for email transmission. It is
an internet standard based on RFC 821 but was later updated to RFC 3207, RFC
5321/5322. Mail servers use SMTP to send and receive email messages from all
points of the internet. Typically, you will find an SMTP server utilizing
Transmission Control Protocol (TCP) port 25 on the network. The path from the
sender to the recipient is outlined in the following diagram:
2. POP3
Post Office Protocol (POP3) is the standardized protocol that allows users to
access their inbox and download emails. POP3 is specifically designed only to
Prepared By Muhammad Ubale Kiru 2
CBS223 Digital Forensics and Analysis
receive emails; the system does not allow users to send emails. This protocol
allows the user to be offline when drafting, reading, or replying and, at the user's
request, can access the online mailbox at the predetermined times.
Be aware that the email you are conducting your digital forensic examination on
may be the only copy. The user has the option to not leave a copy of the email on
the server. Once the email has been downloaded, the system can remove it from
the server to reduce storage use. You will find POP utilizing port 110 on the
network.
3. IMAP
IMAP is the Internet Message Access Protocol and is a standard protocol used by
an email client to access emails on an email server. The protocol was designed
with the goal of complete inbox management with multiple clients. In most cases,
email messages will be left on the server until the user deletes them. IMAP is a
newer protocol than POP, but both are still prevailing email standards in use
today. The most significant difference between IMAP and POP is that POP
retrieves the contents of the mailbox and IMAP was designed as a remote access
mailbox protocol.
An email has many globally unique identifiers for a digital forensic investigator
to identify and to track down. The mailbox and domain name, along with the
message ID, will allow a digital forensic investigator to serve judicially approved
subpoenas/search warrants on the vendor to follow any investigative leads.
The vast majority of email users are only familiar with basic email information,
such as this:
Prepared By Muhammad Ubale Kiru 3
CBS223 Digital Forensics and Analysis
We are back to dealing with our friend Jean, and from looking at the email, we
can see several fields commonly associated with an email.
Here, we know the subject, background checks, the date and time when the email
was sent, the sender, and the recipient. We also have the content of the email, as
shown here:
All the information being shown is user created. The user has created the
information in the to and from, as well as the subject and the content of the
email. The system bases the date and time off of the system time, which can be
set by the user.
The Message-Id field is a unique identification for every email that has been
sent. When a user sends an email, it will receive its message ID at the first email
server it touches. The design of a message ID is that it will be globally unique,
which means there should not be another email with the same message ID. If
you find different emails that contain the same message ID, you are dealing with
one of two scenarios:
Continuing from the bottom to the top, we can see the first Received line.
This email transverses three different email servers. As the email crosses a
server on its journey to its destination, each email server will attach a Received
line on top of the preceding Received line.
This is the first server the email touched; we have the domain name,
dreamhostps.com, along with a user ID.
The next logical step would be to subpoena the ISP and try to identify the
subscriber with user ID 558838.
The term Postfix identifies the email server. Postfix is a free, open source mail
transfer agent and could be a commercial email server or an email server
maintained by a potential bad actor.
The next two Received lines identify the subsequent servers on the path to the
destination
There are optional fields that you may come across in your investigations. These
fields typically start with an X–, as shown here:
These fields are not part of the email protocol standard. They can contain
information about a virus scan, spam scans, or information about the server.
You may also see an optional field called X–Originating–IP that may contain the
IP address of the sender when the message was sent.
An email provider can strip that information and replace it with a server address,
which is what happens when a message is sent from Gmail.
There are two different types of IPv4 addresses: public and private.
You may see both in the email header. If you see a private IP address, you cannot
identify the provider (unless you are investigating within the organization).
1. X1 Social Discovery:
- Purpose: Collects, indexes, and searches emails and social media content for
forensic analysis.
- Usage: Used to gather and analyze email data from various sources, including
cloud-based accounts and social media platforms.
- Usage: Provides detailed analysis of email files from various formats and
supports metadata extraction, keyword searching, and reporting.
3. Volume of Data:
- The sheer volume of email data in corporate environments can make the
collection and analysis process time-consuming and resource-intensive.
- Email forensics must be conducted within the bounds of the law, ensuring that
privacy rights are respected and that evidence is collected in a legally admissible
manner.