Email Tracing Examples Computer Forensics Email Tracing Examples.

Slides:



Advertisements
Similar presentations
Modul 7 Preservasi Surat Elektronik Mata Kuliah Preservasi Informasi Digital.
Advertisements

Tracing Computer Forensics 152 / 252.
Computer Forensics 252 Tracing  Thomas Schwarz, S.J
COEN 350 Security. Contents Why? How to forge ? How to spot spoofed . Distribution Lists The twist that makes authentication … interesting.
NHIN-Direct SMTP/ Notes 6/10/2010. Why we chose Concepts match the charter exactly Implementations match the charter exactly* Well understood.
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
(SMTP, MIME) Message transfer protocol (SMTP) vs message format protocols (RFC 822, Multipurpose Internet Mail Extensions or MIME) Message transfer.
#1 Barnes and Noble. Headers #1 Return-path: Received: from mta19.srv.hcvlny.cv.net (mta19.srv.hcvlny.cv.net [ ]) by mstr2.srv.hcvlny.cv.net.
The SPAM Problem By Steven McIntosh CS526 December 10, 2003.
Tracking the source of spam by examining its header Anh Nguyen May 3 rd, 2010.
Computer & Network Forensics Xinwen Fu Chapter 13 Investigations.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Today we will discuss.
Simple Mail Transfer Protocol Ezra Kissel CISC 856 TCP/IP and Upper Layer Protocols 11/1/2005 (some/most slides provided by M. Lacroce and J. Watson)
! Importance: High BancorpSouth Inview IMPORTANT SECURITY NOTICE All Users - Must Accept New Digital Security Certificate 2007 (Security ISO Certification.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
1 CSCD 496 Computer Forensics Lecture 15 Network Forensics Internet Information - Anonymity Winter 2010.
Tracing an by Etienne Takougang by Etienne Takougang.
The best security devices don’t stop cars getting stolen Thieves look for the old cars/alarms Or careless owners…
Grover Kearns, PhD, CPA, CFE Class Videos 2 How works Spoofing
03/09/05Oregon State University X-Sig: An Signing Extension for the Simple Mail Transport Protocol (SMTP) Robert Rose 03/09/05.
10. Electronic Mail.
Simple Mail Transfer Protocol
Cosc 4750 Electronic Mail.
Basic Internet Services , login, file transfer, news, document distribution, Web services Service management.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
CT 320: Network and System Administration Fall 2014 * Dr. Indrajit Ray Department of Computer.
Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Official information in – managing the risk of leakage ● Reduce risk via protective markings ● Simplify.
1999 Asian Women's Network Training Workshop 1 Technical Terms We Can’t Avoid.
1 Final Exam Review (Part 2) BUS Abdou Illia, Fall 2007 (Thursday 12/6/2007)
Example of a “Phishing,” and Web Site ECE Communications Network Security Prof. John A. Copeland Georgia Tech.
WeeSan Lee
Chap 81 Electronic mail security. Chap 82 Outline Pretty good privacy S/MIME Recommended web sites.
Internet Services Some samples: , login, file transfer, news document distribution, web services, etc…
NHIN-Direct SMTP/ Notes 6/8/2010. Why we chose Concepts match the charter exactly Implementations match the charter exactly* Well understood.
Examples – RFC 5322 MIME messages multipart/alternative Human Readable Text To: "External, User" From: "Test, User1" Subject: I-D ACTION:draft-ietf-mailext-pipeline-01.txt.
Fighting spam by finding and listing Exploitable Servers.
SMTP( 简单邮件传输协议 ) SIMPLE MAIL TRANSFER PROTOCOL RFC 2812.
Targeted Break-in, DoS, & Malware attacks (I) (February 18, 2015) © Abdou Illia – Spring 2015.
05/19/2003 Christiane Schmidt 1 IMAP internet message access protocol.
CS1Q Computer Systems Lecture 20 Simon Gay. Lecture 20CS1Q Computer Systems - Simon Gay2 DNS Optimisations The domain name system as described would be.
1 Electronic mail security Ola Flygt Växjö University, Sweden
1 Chinese . 2 Introduction  Support SMTP/POP3/IMAP4  On Unix platform  Provide Webmail –Functions: On line registration On line sending and receiving.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID.
Anti-Spam Tagging Al Lilianstrom. Spam Tagging The Computing Division is testing a Spam Tagging solution Based on SpamAssassin All incoming mail to the.
April 5, 2004 Prof. Paul Lin 1 CPET 355 Data Communications & Networking 7. The Application Layer: Paul I-Hai Lin, Professor Electrical and Computer.
Tracing COEN 152 / 252 Computer Forensics  Thomas Schwarz, S.J
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Tracing Computer Forensics 252  Thomas Schwarz, S.J
Web Programming Week 9 Old Dominion University Department of Computer Science CS 418/518 Fall 2010 Martin Klein 10/26/10.
Technical Awareness on Analysis of Headers.
CS440 Computer Networks 1 Neil Tang 12/01/2008.
CIT 140: Introduction to ITSlide #1 CSC 140: Introduction to IT Electronic Mail.
Spam liquidator What is SL ??? Definition : It is a tool to block the junk mail !
Tracing Examples Computer Forensics Tracing Examples.

Social Media And Global Computing Sending
MON TUE WED THU
2017 Jan Sun Mon Tue Wed Thu Fri Sat

Jan Sun Mon Tue Wed Thu Fri Sat
2008 Calendar.
Sun Mon Tue Wed Thu Fri Sat
Sun Mon Tue Wed Thu Fri Sat

2016 | 10 OCT SUN MON TUE WED THU FRI SAT
Sun Mon Tue Wed Thu Fri Sat
TIMELINE NAME OF PROJECT Today 2016 Jan Feb Mar Apr May Jun
開始我的第一封伊妹兒 課程名稱:開始我的第一封伊妹兒 上課對象:國中一年級 上課地點:一人一機電腦教室 上課時數:一堂課(50mins)
2008 Calendar.
Presentation transcript:

Email Tracing Examples Computer Forensics Email Tracing Examples

Microsoft Mail Internet Headers Version 2. 0 Received: from SEARCH Microsoft Mail Internet Headers Version 2.0 Received: from SEARCH.ORG ([64.162.18.2]) by sgisrv1.search.org with Microsoft SMTPSVC(5.0.2195.3779); Wed, 23 Oct 2002 10:53:19 –0700 Received: from hotmail.com ([216.33.240.88]) by SEARCH.ORG with ESMTP (IOA-IPAD 2.54) id 4171800; Wed, 23 Oct 2002 10:59:54 –0800 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Wed, 23 Oct 2002 10:53:19 –0700 X-Originating-IP: [64.162.18.159] From: "TC" boston17@hotmail.com To: jqs@search.org Subject: Kittens for sale Date: Wed, 23 Oct 2002 10:48:16 –0700 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_000A_01C27A81.B1743CB0“ X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Message-ID: OE31FFsAitVGeSJIEoP00003f05@hotmail.com X-OriginalArrivalTime: 23 Oct 2002 17:53:19.0069 (UTC) FILETIME=[1216D8D0:01C27ABD] Return-Path: boston17@hotmail.com

From tschwarz@cse.ucsc.edu Fri Jan 16 15:51:11 2004 Return-Path: <tschwarz@cse.ucsc.edu> Received: from sundance.cse.ucsc.edu (sundance.cse.ucsc.edu [128.114.48.62]) by server4.engr.scu.edu (8.12.10/8.12.10) with SMTP id i0GNpA8K007608 for <tschwarz@engr.scu.edu>; Fri, 16 Jan 2004 15:51:10 -0800 Received: (from tschwarz@localhost) by sundance.cse.ucsc.edu (8.6.10/8.6.12) id PAA18463 for tschwarz@engr.scu.edu; Fri, 16 Jan 2004 15:51:10 -0800 Date: Fri, 16 Jan 2004 15:51:10 -0800 From: Thomas Schwarz <tschwarz@cse.ucsc.edu> Message-Id: <200401162351.PAA18463@sundance.cse.ucsc.edu> To: tschwarz@engr.scu.edu Subject: email X-Spam-Checker-Version: SpamAssassin 2.60-rc3 (1.202-2003-08-29-exp) on server4.engr.scu.edu X-Spam-Level: X-Spam-Status: No, hits=0.0 required=5.0 tests=none autolearn=ham version=2.60-r c3 This is a test.

Return-Path: <rhn-bounce+2443612-3000675@rhn.redhat.com> Received: from rhn-mail.rdu.redhat.com (mail.rhn.redhat.com) [66.187.232.120] by mail.zionsvillepd.com (8.12.8/8.12.5) with ESMTP id h5J5iCjI022534 for <jmorris@zionsvillepd.com>; Thu, 19 Jun 2003 00:44:13 -0500 Received: from admin.rdu-colo.redhat.com (nat-pix.rdu-colo.redhat.com [10.255.17.200] by rhn_mail.rdu-colo.redhat.com (8.11.6/8.11.6) with ESMTP id h5J5amx01895 for <jmorris@zionsvillepd.com>; Thu, 19 Jun 2003 01:36:49 -0400 Received: from admin.rhu-colo.redhat.com (localhost.localdomain [127.0.0.1]) by admin.rdu-colo.redhat.com (8.11.6/8.11.6) with ESMTP id h5J5WW920293 for <jmorris@zionsvillepd.com>; Thu, 19 Jun 2003 01:32:32 -0400 Date: Thu, 19 Jun 2003 01:32:32 -0400 Message-Id: <200306190532.h5J5WW920293@admin.rdu-colo.redhat.com> Subject: RHN Errata Alert: Updated WindowMaker packages fix vulnerability in theme-loading Content-Type: TEXT/PLAIN; charset=US-ASCII X-RHN-Info: Autogenerated mail for ZPD X-RHN-Email: <jmorris@zionsvillepd.com> Precedence: first-class Errors-To: rhn-bounce+2443612-3000675@rhn.redhat.com From: Red Hat Network Alert <rhn-admin@rhn.redhat.com> To: ZPD <jmorris@zionsvillepd.com> X-RHN-Login: ZPD

From mixmaster@futureworlds.it Fri Jan 16 15:45:07 2004 Return-Path: <mixmaster@futureworlds.it> Received: from www.futureworlds.it (ip-081-104.customer.panservice.it [212.66.10 4.81]) by server4.engr.scu.edu (8.12.10/8.12.10) with ESMTP id i0GNj58K004457 for <tschwarz@engr.scu.edu>; Fri, 16 Jan 2004 15:45:06 -0800 Received: by www.futureworlds.it (Postfix, from userid 1011) id 8CE991F0F5A; Sat, 17 Jan 2004 00:45:01 +0100 (CET) From: futureworlds <nobody@mail.futureworlds.it> To: tschwarz@engr.scu.edu Subject: Test Message-ID: <06e358af1c20ba88603856b809ead72d@mail.futureworlds.it> Date: Sat, 17 Jan 2004 00:45:01 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 2.60-rc3 (1.202-2003-08-29-exp) on server4.engr.scu.edu X-Spam-Level: X-Spam-Status: No, hits=0.0 required=5.0 tests=none autolearn=ham version=2.60-rc3