Topic_8 Email & Web Forensics
Topic_8 Email & Web Forensics
8-1 Introduction
The Internet is a very easy way to reach any system. If confidential data is not
properly protected, then it becomes opens to vulnerable access and misuse. Cyber-
crime can cause varying degrees of damage by hackers. So, detailed forensic
analysis is required to come to a conclusion about an incident and to prove or
disprove someone’s guilt.
Some criminal activities like child pornography, hacking, and identity theft can be
traced and the criminals can be punished if proper evidence is found against them.
Client: The computer that’s receiving or sending the e-mail. Think of the
client as your home mail box.
Server: The computer that’s storing e-mail it receives until the destination client
retrieves them. Think of the server as your local post office where mail is sent and
received.
70
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
Under this two-part structure, e-mail servers can find an e-mail’s destination
quickly by looking up the IP address of the domain in a domain name server
(DNS).
71
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
When you’re looking at an e-mail message, you see only these two parts and not the
packets that were used to deliver the message because you’re looking at it after
delivery. Anyone who wants to capture packets of e-mail en route from source
to destination can do so by using packet sniffer software. Unless it has been
encrypted, e-mail is sent in plain text and is readable like a post card.
72
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
The piece of information most useful to you is the originating IP address (source
IP address) or domain. You can use this address to try to track down the person
who sent the e-mail — unless it has been spoofed or faked.
A unique ID is assigned to the message by the first e-mail server that the e-mail
passes through. You can find the e-mail’s footprints on the servers it had passed
through using this ID. If you can catch the e-mail server logs before they’re
overwritten, you can literally track the true date/time of the e-mail as it passes
through the network.
In most full headers, the path of the e-mail starts at the bottom and works its
way up. For example, in Figure 9-4, by following the date-and-time stamps, you see
that the e-mail traveled through two e-mail servers to arrive at its destination.
73
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
e-mail client software. Here’s a description of the two most common e-mail client
systems:
_ Outlook: It can act as a data assistant with features such as a calendar, a task list,
and contact management. When you investigate cases where Outlook has been used
to manage the day-to-day affairs of a suspect, you find enormous detailed
information! Unlike Outlook Express, Outlook saves all its data into a single
identity using a .pst file extension. You need a viewer or forensic software to
view the contents of this file. FTK and EnCase offer the most complete method for
extracting Outlook files.
_ Outlook Express: From Microsoft, stores data in files with a .dbx file
extension and requires you to have a viewer to read them.
In Outlook Express, Outlook, AOL, Eudora, and Thunderbird, e-mail is stored on
the local client computer, which helps your investigation alot.
74
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
Figure 9-6 smmarizes the basic e-mail interactions on a Web mail server.
The easiest way to view the contents of a person’s Web mail account is to get
permission from that person. But unlikely that happening. Instead, you can find
data by using forensic methods on the local machine.
Extracting every Web page that a suspect has ever visited would take to view all
those pages into the next decade.
75
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
Web forensic analysis brings out some details like when and in what sequence
did somebody access a Web page.
76
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
temporary files, but you also find the number of days Internet Explorer keeps the
history of the Web sites you visited.
If the application doesn’t have the ability to temporarily store files for use later, it
often lets the operating system handle this function via the swap file or virtual
memory.
The swap file is an operating system function that acts like RAM, but uses the
hard drive or storage device instead of memory microchips. Because the swap
file is written and then deleted, the information is still physically on the storage
device and retrievable by you.
77
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
only looks for active database files, but also deleted files in unallocated space that
contain web surfing histories.
78
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
79
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
80
Lecture 8 Email & Web Forensics Digital Forensics 2018-2019
Windows registry has keys which are similar to folders and values which are
name/data pairs. One such entry to be examined is the
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs key
which obtains all of the URLs that were typed into Internet Explorer by the current
user during their Website surfing.
[Skoudias 2008].
The HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\UBSTOR/s key obtains
the history on every USB device that was ever plugged into the user’s system.
The HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces key
does not only obtain the current IP address but all recently used IP configurations.
In Internet Explorer, the history of visited sites is maintained in a file called
index.dat, which is referenced in the Windows Registry database. That is the
reason why one can see the history contents in the TypedURLs key.
Firefox keeps limited information in the registry. It stores its history in ASCII
format in a history.dat file located at C:\Documents and
Settings\<user>\Application Data\Mozilla\Firefox\Profiles\x.default\ in Windows
XP and C:\Documents and Settings\<user>\AppData\Roaming\Mozilla\Firefox\Profiles\clfzo15s.default.
81