FORENSIC ANALYSIS OF
EMAIL
BY
Dr.K.SRINIVAS
Cyber forensics
• Cyber forensics, also known as computer forensics or digital
forensics, is the process of collecting and analyzing digital
evidence. It's used to investigate cyberattacks and other
illegal activities.
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
• Email forensics involves investigating emails to gather
evidence for legal or investigative purposes. It focuses on
analyzing email content, headers, attachments, and
metadata to establish facts or track the origin of emails.
Anti-forensics, on the other hand, refers to techniques used
to evade or hinder forensic investigation efforts.
• The two parts of an email are the header and the body. The
body of the message contains the message itself, while the
header contains metadata such as the message’s origin,
delivery date, and destination address. Analyzing email
headers is one of the most typical jobs in computer
forensics, and it may be beneficial if we have questions
about the legitimacy of an email sender.
• Objectives
• To determine whether or not the email is genuine.
• To look into incidents of cybercrime that include the usage
of emails.
• Email Header Analysis
• The analysis of the email header is the first step in email
forensics since it includes a wealth of information about the
email content. This examination includes both the text body
and the email header, which contains information about the
specific email. Email header analysis aids in the detection of
most email-related crimes such as spear phishing,
spamming, and email spoofing. One can tell if an email is
from a faked or legitimate address by looking at the email
headers.
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
• Full Explanation of Email Analysis
• Delivered To: The above email header field contains email
address of the intended recipient.
Received By: This field includes information about the
previous SMTP server you visited. The following details are
revealed:
• Server’s IP address
• SMTP ID of the visited server
• Data and time at which the email was received by the
SMTP server.
• X-Received: Some email parameters are not defined in
Internet Official Protocol Standards and are called non-
standard headers. These are generated by mail transfer
agents, such as Google’s SMTP server, which employ the X-
Received field to share non-standard information. This field
should not be overlooked while examining email headers
because it contains the following information:
• IP address of the message-receiving servers
• SMTP ID of the server
• Data and time at which the email was received.
• ARC-Seal: This header contains a signature that includes the
ARC-Message-Signature and the information from the ARC
Authentication Results header.
• ARC-Message-Signature: This is a DKIM-like signature and
takes a snapshot of the message header information. This
includes to, from, subject and body.
cyber forensics, of email analysis using
• Received-SPF: The Sender Policy Framework (SPF) is a
security framework for email that verifies the sender. Only
once the sender’s identity has been verified does the system
forward the message. The following codes are used:
• Pass: Email source is valid
• Soft fail: Fake source possible
• Neutral: Source validity difficult to ascertain
• None: SPF record not found
• Unknown: SPF check can’t be performed
• Error: An error occurring during SPF check
cyber forensics, of email analysis using
• ARC Authentication Results: This header contains email
authentication results like SPF, DKIM, and DMARC.
cyber forensics, of email analysis using
• DKIM, or Domain Keys Identified Mail, lets an organization
(or handler of the message) take responsibility for a
message that is in transit. DKIM attaches a new domain
name identifier to a message and uses cryptographic
techniques to validate authorization for its presence. DKIM
allows the receiver to check that an email claimed to have
come from a specific domain was indeed authorized by the
owner of that domain. The following are the various tags of
the DKIM signature header:
• v: application version.
• a: algorithms used for encryption.
• c: algorithms used for canonicalization.
• s: selector record name used with the domain.
• h: signed header fields that are used in the signing algorithm to create the hash
in b= tag.
• bh: hash of the message body.
• b: hash data of the headers listed in the h= tag. It’s also called DKIM signature.
• d: domain used with the selector record.
• So, we can say it is a valid email as DKIM, SPF, DMARC are passed, which means
email source is legit.
cyber forensics, of email analysis using
cyber forensics, of email analysis using
ANALYSIS OF FAKE EMAIL
cyber forensics, of email analysis using
• From the ARC-Authentication-Result, spf = softail means
fake source possible. The value of dmarc = fail suggest that
source isn’t legit.
• Return-Path :< softwaricacollege12345@gmail.com>
This field contains the email address where the message is
returned, in case it fails to reach the intended recipient. This
can easily happen if the sender has used a wrong email
address for the recipient.
cyber forensics, of email analysis using
cyber forensics, of email analysis using
• As we can notice in from: Softwarica college <
softwaricacollege12345@gmail.com>, the email claims to
have originated from Softwarica college. However, the
received header shows that the email indeed has originated
from emkei.cz, which is a publicly available fake email
service. Even though the email claims to be from Softwarica
College, the received header reveals that it came from
emkei.cz.
CONCLUSION
• To summarize, email headers include information such as
the sender’s IP address, internet service provider, email
client, and even location, as well as information regarding
the origin and course an email traveled before arriving at its
destination. The information might be used to determine
the validity of a suspicious email or to prevent the sender
from sending more emails. The headers may also be used to
identify header spoofing, which is a strong sign that the
email was sent with malicious intent.
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using
cyber forensics, of email analysis using

More Related Content

PPTX
Network and Internet Security.pptx
PPTX
Forensics Analysis of Email cyber forensics
PPTX
Email forensic and social media forienc.pptx
PPTX
Sender Policy Framework (SPF): An Email Authentication Technique
PPTX
DKIM PRes.pptx
PPTX
E mail Investigation
PPTX
Email Forensics
PPT
"Being creative with data" 25th November - Neteffekt presentation
Network and Internet Security.pptx
Forensics Analysis of Email cyber forensics
Email forensic and social media forienc.pptx
Sender Policy Framework (SPF): An Email Authentication Technique
DKIM PRes.pptx
E mail Investigation
Email Forensics
"Being creative with data" 25th November - Neteffekt presentation

Similar to cyber forensics, of email analysis using (20)

PDF
Email_Account_Compromise_VB_2023_Final 2.pdf
PPTX
Improving email reliability
PPTX
Email PowerPoint Presentation for COPQC 2
PPTX
How Cybercriminals Cheat Email Authentication
PDF
Data Migration Best Practices
PPTX
E mail forensics
PPTX
Digital signature.pptx
PDF
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
PPTX
What is Email Authentication? Methods and How to Do It.pptx
PPTX
Atlanta Eloqua User Group - May 2016
PDF
A guide to email spoofing
PPTX
Domain Keys Identified Mail (DKIM) protects email
PDF
How does sender verification work how we identify spoof mail) spf, dkim dmar...
PDF
Protect your domain with DMARC
PPT
Outlook and thunderbird ii
PDF
GoDMARC - Block Email Phishing
PDF
Join the fight against email spam! - SweetlakePHP
PPTX
PPT
cyber forensics Email Investigations.ppt
PDF
Complete guide to_email
Email_Account_Compromise_VB_2023_Final 2.pdf
Improving email reliability
Email PowerPoint Presentation for COPQC 2
How Cybercriminals Cheat Email Authentication
Data Migration Best Practices
E mail forensics
Digital signature.pptx
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
What is Email Authentication? Methods and How to Do It.pptx
Atlanta Eloqua User Group - May 2016
A guide to email spoofing
Domain Keys Identified Mail (DKIM) protects email
How does sender verification work how we identify spoof mail) spf, dkim dmar...
Protect your domain with DMARC
Outlook and thunderbird ii
GoDMARC - Block Email Phishing
Join the fight against email spam! - SweetlakePHP
cyber forensics Email Investigations.ppt
Complete guide to_email
Ad

More from Srinivas Kanakala (20)

PPTX
EXERCISE 2: Importance of visualizations Principles of communicating data, Pr...
PPTX
cyber security unit introduction to privacy
PPTX
620054032-20220209112111-PPT06-Probabilistic-Reasoning.pptx
PPT
IPR Unit 3 Copyrights and Geographical indications -.ppt
DOCX
list of Scopus journals to publish papers
DOCX
international conferences names and link
PPTX
introduction to cyber forensics, digital
PPTX
Cyberspace and the Law & Cyber Forensics
PPTX
Cyber Security Concepts, layers of security,
PPTX
UNIT 1 INTELLIGENT AGENTS ARTIFICIAL INTELIGENCE
PPTX
FOUNDATIONS OF ARTIFICIAL INTELIGENCE BASICS
PPTX
MALWARE ANALYSIS USING DEEP LEARNING PRE
PPTX
System Logs Anomaly Detection Using Deep Learning
PDF
RM IPR R22 SYLLABUS REESEARCH METHODOLOGY HELPS FOR WRITING ARTICILES
PDF
Computer Network Security and Cyber Ethics ( PDFDrive ).pdf
PDF
Cyber Crime Investigations ( PDFDrive ).pdf
PPTX
Software Estimation: Components of Software Estimations, Estimation methods...
PPTX
FLOWCHARTS.pptx
PPTX
Minor project ppt (1).pptx
PPTX
system hacking.pptx
EXERCISE 2: Importance of visualizations Principles of communicating data, Pr...
cyber security unit introduction to privacy
620054032-20220209112111-PPT06-Probabilistic-Reasoning.pptx
IPR Unit 3 Copyrights and Geographical indications -.ppt
list of Scopus journals to publish papers
international conferences names and link
introduction to cyber forensics, digital
Cyberspace and the Law & Cyber Forensics
Cyber Security Concepts, layers of security,
UNIT 1 INTELLIGENT AGENTS ARTIFICIAL INTELIGENCE
FOUNDATIONS OF ARTIFICIAL INTELIGENCE BASICS
MALWARE ANALYSIS USING DEEP LEARNING PRE
System Logs Anomaly Detection Using Deep Learning
RM IPR R22 SYLLABUS REESEARCH METHODOLOGY HELPS FOR WRITING ARTICILES
Computer Network Security and Cyber Ethics ( PDFDrive ).pdf
Cyber Crime Investigations ( PDFDrive ).pdf
Software Estimation: Components of Software Estimations, Estimation methods...
FLOWCHARTS.pptx
Minor project ppt (1).pptx
system hacking.pptx
Ad

Recently uploaded (20)

PPTX
Math 2 Quarter 2 Week 1 Matatag Curriculum
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PDF
anganwadi services for the b.sc nursing and GNM
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PDF
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
PDF
FAMILY PLANNING (preventative and social medicine pdf)
PPTX
climate change of delhi impacts on climate and there effects
PPTX
ENGlishGrade8_Quarter2_WEEK1_LESSON1.pptx
PDF
IS1343_2012...........................pdf
PPTX
UCSP Section A - Human Cultural Variations,Social Differences,social ChangeCo...
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PPTX
Approach to a child with acute kidney injury
PDF
Review of Related Literature & Studies.pdf
PPTX
CHROMIUM & Glucose Tolerance Factor.pptx
PPTX
MMW-CHAPTER-1-final.pptx major Elementary Education
PPTX
Unit1_Kumod_deeplearning.pptx DEEP LEARNING
PPTX
IT infrastructure and emerging technologies
PDF
Health aspects of bilberry: A review on its general benefits
Math 2 Quarter 2 Week 1 Matatag Curriculum
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
Power Point PR B.Inggris 12 Ed. 2019.pptx
anganwadi services for the b.sc nursing and GNM
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
FAMILY PLANNING (preventative and social medicine pdf)
climate change of delhi impacts on climate and there effects
ENGlishGrade8_Quarter2_WEEK1_LESSON1.pptx
IS1343_2012...........................pdf
UCSP Section A - Human Cultural Variations,Social Differences,social ChangeCo...
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Approach to a child with acute kidney injury
Review of Related Literature & Studies.pdf
CHROMIUM & Glucose Tolerance Factor.pptx
MMW-CHAPTER-1-final.pptx major Elementary Education
Unit1_Kumod_deeplearning.pptx DEEP LEARNING
IT infrastructure and emerging technologies
Health aspects of bilberry: A review on its general benefits

cyber forensics, of email analysis using

  • 2. Cyber forensics • Cyber forensics, also known as computer forensics or digital forensics, is the process of collecting and analyzing digital evidence. It's used to investigate cyberattacks and other illegal activities.
  • 33. • Email forensics involves investigating emails to gather evidence for legal or investigative purposes. It focuses on analyzing email content, headers, attachments, and metadata to establish facts or track the origin of emails. Anti-forensics, on the other hand, refers to techniques used to evade or hinder forensic investigation efforts.
  • 34. • The two parts of an email are the header and the body. The body of the message contains the message itself, while the header contains metadata such as the message’s origin, delivery date, and destination address. Analyzing email headers is one of the most typical jobs in computer forensics, and it may be beneficial if we have questions about the legitimacy of an email sender.
  • 35. • Objectives • To determine whether or not the email is genuine. • To look into incidents of cybercrime that include the usage of emails.
  • 36. • Email Header Analysis • The analysis of the email header is the first step in email forensics since it includes a wealth of information about the email content. This examination includes both the text body and the email header, which contains information about the specific email. Email header analysis aids in the detection of most email-related crimes such as spear phishing, spamming, and email spoofing. One can tell if an email is from a faked or legitimate address by looking at the email headers.
  • 42. • Full Explanation of Email Analysis • Delivered To: The above email header field contains email address of the intended recipient. Received By: This field includes information about the previous SMTP server you visited. The following details are revealed: • Server’s IP address • SMTP ID of the visited server • Data and time at which the email was received by the SMTP server.
  • 43. • X-Received: Some email parameters are not defined in Internet Official Protocol Standards and are called non- standard headers. These are generated by mail transfer agents, such as Google’s SMTP server, which employ the X- Received field to share non-standard information. This field should not be overlooked while examining email headers because it contains the following information: • IP address of the message-receiving servers • SMTP ID of the server • Data and time at which the email was received.
  • 44. • ARC-Seal: This header contains a signature that includes the ARC-Message-Signature and the information from the ARC Authentication Results header. • ARC-Message-Signature: This is a DKIM-like signature and takes a snapshot of the message header information. This includes to, from, subject and body.
  • 46. • Received-SPF: The Sender Policy Framework (SPF) is a security framework for email that verifies the sender. Only once the sender’s identity has been verified does the system forward the message. The following codes are used: • Pass: Email source is valid • Soft fail: Fake source possible • Neutral: Source validity difficult to ascertain • None: SPF record not found • Unknown: SPF check can’t be performed • Error: An error occurring during SPF check
  • 48. • ARC Authentication Results: This header contains email authentication results like SPF, DKIM, and DMARC.
  • 50. • DKIM, or Domain Keys Identified Mail, lets an organization (or handler of the message) take responsibility for a message that is in transit. DKIM attaches a new domain name identifier to a message and uses cryptographic techniques to validate authorization for its presence. DKIM allows the receiver to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain. The following are the various tags of the DKIM signature header:
  • 51. • v: application version. • a: algorithms used for encryption. • c: algorithms used for canonicalization. • s: selector record name used with the domain. • h: signed header fields that are used in the signing algorithm to create the hash in b= tag. • bh: hash of the message body. • b: hash data of the headers listed in the h= tag. It’s also called DKIM signature. • d: domain used with the selector record. • So, we can say it is a valid email as DKIM, SPF, DMARC are passed, which means email source is legit.
  • 56. • From the ARC-Authentication-Result, spf = softail means fake source possible. The value of dmarc = fail suggest that source isn’t legit. • Return-Path :< [email protected]> This field contains the email address where the message is returned, in case it fails to reach the intended recipient. This can easily happen if the sender has used a wrong email address for the recipient.
  • 59. • As we can notice in from: Softwarica college < [email protected]>, the email claims to have originated from Softwarica college. However, the received header shows that the email indeed has originated from emkei.cz, which is a publicly available fake email service. Even though the email claims to be from Softwarica College, the received header reveals that it came from emkei.cz.
  • 60. CONCLUSION • To summarize, email headers include information such as the sender’s IP address, internet service provider, email client, and even location, as well as information regarding the origin and course an email traveled before arriving at its destination. The information might be used to determine the validity of a suspicious email or to prevent the sender from sending more emails. The headers may also be used to identify header spoofing, which is a strong sign that the email was sent with malicious intent.