Practical-1 Email Investigation and IP Tracing: History
Practical-1 Email Investigation and IP Tracing: History
191127107086 Batch – B1
Practical-1
Email Investigation and IP Tracing
Introduction
What is Email?
Short for electronic mail, email (or e-mail) is defined as the transmission of messages over
communications networks. Typically, the messages are notes entered from the keyboard or
electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an
email system. It is a method of exchanging messages ("mail") between people using electronic
devices. Emails are widely used to send and receive messages over the internet.
History:
The first example of email can be found on computers at MIT in a program called “MAILBOX”, all the
way back in 1965. Emails have very limited use in 1960, which only use to transfer emails between
single host, but in 1971 ARPANET (Advanced Research Projects Agency Network), successfully
transfer email between different host using “@” (at sign) for define server. Indicating a destination
for a message became as simple as addressing it: “username@name of computer”, which is
essentially how email has been addressed ever since.
By the 1980’s, the infancy of the internet, Internet Service Providers (ISPs) had begun connecting
people across the world, and email “hosting” sites began to pop up.
By 1993 the word “electronic mail” had been replaced by “email” in the public lexicon and internet
use had become more widespread.
As the market potential of the internet became widely apparent, Email spam began to multiply
exponentially, creating the need for email sorting software.
username@gmail.com
Above initial part(username) is called username.
• Phishing and spoofing mail: mail phishing is the act of impersonating a business or other entity for
the purpose of tricking the recipient of email into giving up sensitive personal information. Data
gleaned from phishing often is used to commit identity theft or to gain access to online accounts.
Spoofing is similar to email phishing in that it uses deception to trick users into providing sensitive
information. Email spoofing involves the use of a header appearing to have originated from
someone (or somewhere) other than the true source.
• To solve cases like – Extortion, Narcotics trafficking, Stalking, Sexual harassment, Fraud, Child
abductions & child pornography, Cyber terrorism etc.
With webmail, all of our email is with an email client, our email is
backed up on the server, meaning downloaded onto our computer,
we will still have access in the event allowing us to back up our emails
your computer breaks down onto our hard drive or cloud storage,
if there is one present. (i.e.
Example: Gmail using Google chrome or Dropbox).
Mozilla Firefox Example: Thunderbird or Microsoft
Outlook
Sender
Internet (SMTP)
receiver
Email server:
A mail server (or email server) is a computer system that sends and receives email.
A mail server can receive e-mails from client computers and deliver them to other mail
servers. A mail server can also deliver e-mails to client computers. A client computer is
normally the computer where we read our e-mails, for example our computer at home or in
your office.
The two mail servers which are used for outgoing emails are called as MTAs, mail transfer
agents. The other two mail servers used for incoming, using POP3/IMAP protocols are called
as MDAs, the mail delivery agents.
Email protocols:
1. SMTP (Simple Mail Transfer Protocol)
•it is a protocol that is used when e-mails are delivered from clients to servers and from servers to
other servers.
•A POP server uses a protocol named POP3 for its communication. That is the reason why it is called
a POP server.
Investigation of email:
•After crime has been committed involving E- Mail, first and foremost the victim’s computer should
be accessed to recover the evidence.
• Using the victim’s E- Mail client, any potential evidence should be searched and copied. • It
might be necessary to log on to the E- Mail service and access any protected or encrypted files or
folders. The contents of the mail must be copied including its header.
• The header contains unique identifying numbers, such as the IP address of the server that sent the
message.
Email header:
Every single Internet e-mail message is made up of two parts the header and the message body of
the email. Every single email we send or receive on the Internet contains an Internet Header, a full
and valid e-mail header provides a detailed log of the network path taken by the message between
the mail sender and the mail receiver(s) (email servers).
email client program will usually hide the full header or display only lines, such as From, To, Date,
and Subject, see below for more information on pulling headers for your email client.
Here is a breakdown of the most commonly used and viewed headers, and their values:
From: sender's name and email address (IP address here also, but hidden)
To: recipient's name and email address
Date: sent date/time of the email
Subject: whatever text the sender entered in the Subject heading before sending
To see a header file of an email-
Step-1
Step-2
• With many E- Mail programs, E- Mail can be copied by dragging it to a storage medium, such as a
folder or drive, or by saving it in a different location.
• For E Mail programs it is run from the command line, however, after opening the message, it can
be copied by using the copy option which is usually located at the bottom of the screen. • After copy
of E- Mail is made, it is imperative to work on the copy only, and not upon the original version, in
order to avoid altering the original evidence by mistakes.
• This section includes instructions for viewing E- Mail headers in a variety of E- Mail programs,
including Windows GUI clients, a UNIX command-line E- Mail program, and some common Web-
based E- Mail providers.
• After the E- Mail headers are opened, the same is copied and pasted into a text document so that
it can be read with a text editor, such as Windows.
• The crucial piece of information is to look for the originating E- Mail’s domain address or an IP
address. Other supportive information consists of the date and time the message was sent,
filenames of any attachments, and unique message number, if it is supplied.
• On the client computer, all the E- Mails are saved in a separate folder for recordkeeping
purposes. For example, in Outlook, messages can be saved as sent, draft, deleted, and received E-
Mails in a
.pst file, or can be saved offline files in an .ost file.
• With these client files (.pst and .ost), user can access and read their E- Mail offline, when their
computers aren’t connected to the central E- Mail server. • Most E- Mail programs also include an
electronic address book also known as Contacts, and many offer calendars, tasks list, and memos.
• https://getnotify.com/
• http://didtheyreadit.com/index.php/membersend
• http://www.readnotify.com
• Email Tracing:
Email tracing is a method for find out the origin of sender using header of mail.
Types of Methods-
1. Manual Tracing:
2. Automatic Tracing:
https://whatismyipaddress.com/trace-email