Email Forensics. Case Study An email attached to a $20 million dollar lawsuit purported to be from the CEO of “Tech.com” to a venture capital broker.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
By Won Lee.  Stands for Simple Mail Transfer Protocol  Used for sending and receiving electronic mail efficiently and reliably  Daily function of life.
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
Application Layer Pertemuan 25 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Today we will discuss.
Chapter 30 Electronic Mail Representation & Transfer
Internet Basics.
Guide to Operating System Security Chapter 10 Security.
POP Configuration Microsoft Outlook Express 6.x.
Chapter Overview TCP/IP Protocols IP Addressing.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Electronic Mail (SMTP, POP, IMAP, MIME)
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
1 What is Electronic Mail Exchanging information via computer networks Electronic mail addresses SMTP (Simple Mail Transfer Protocol) Client/Server based.
Process-to-Process Delivery:
Forensic and Investigative Accounting
Computer Concepts 2014 Chapter 7 The Web and .
Internet Protocols & Client Server Programming
Intro to Computer Networks Internet and Networking Terms Bob Bradley The University of Tennessee at Martin.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Application Protocols: ELECTRONIC MAIL (SMTP, POP) CSNB534 Semester 2, 2007/2008 Asma Shakil.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Unit 6 Tracking Internet Crime. Tracing In general, is also going to be one of the easiest forms to track and trace. service providers.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer.
Section 2.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
Simple Mail Transfer Protocol (SMTP)
Unit 8 – & Cell Phones Dr. Joe Ciccone – CJ 317
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Tracing.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Guide to TCP/IP, Third Edition Chapter 8: The Dynamic Host Configuration Protocol.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
SMTP / MIME Florin Zidaru.
Technical Awareness on Analysis of Headers.
SMTP - Simple Mail Transfer Protocol RFC 821
CIT 140: Introduction to ITSlide #1 CSC 140: Introduction to IT Electronic Mail.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Unit-6 Handling Sessions and Cookies. Concept of Session Session values are store in server side not in user’s machine. A session is available as long.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to TCP/IP.
Computer Networking 网络课件 双语教学 模拟实验 计算机网络教研室 Department of Computer Networking Application CHAPTER 14 INTERNETWORKING 1 The first section 2 Exercises.
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Internet Business Associate v2.0
SMTP: simple mail transfer protocol
Chapter 10: Application Layer
Social Media And Global Computing Sending
Chapter 8: Monitoring the Network
Week 5: Network Protocols Part 1
Process-to-Process Delivery:
TCP/IP Protocol Suite: Review
William Stallings Data and Computer Communications
Chapter 7 Network Applications
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Forensics

Case Study An attached to a $20 million dollar lawsuit purported to be from the CEO of “Tech.com” to a venture capital broker. The message outlined guaranteed “warrants” on the next round of funding for the broker. “Tech.com filed counterclaim and claimed the was a forgery. Their law firm engaged us to determine the validity of the message. We imaged all of the CEO’s computers at his office and his home. Recalled the server backup tapes from off-site storage.

Case Study Searched all hard drives and server backups for “questioned” message. Search revealed no trace of the message on any of the hard drives or mail spools. When the timestamps and message ids were compared with the server logs it was found that the “questioned” message could not have gone through either “Tech.com’s” webmail or mail server at the time indicated by the date/time stamp on the message. Based on our analysis Defendants filed motion to image and examine broker’s computers.

Case Study Federal Judge issued subpoena and we arrived at broker’s business, but he refused to allow his system to imaged. Broker’s lawyer went into State Court, on a companion case, and got Judge to issue an order for a new Court appointed examiner. The examination revealed direct proof of the alteration of a valid message’s header to create the “questioned” . What follows are some of the tools and techniques used to document the activity.

Internet Standards (RFCs) RFC – (Request for Comment) Standards for Internet Protocols RFC 2821 Simple Mail Transfer Protocol (SMTP) – the objective of SMTP is to transfer mail reliability and efficiently. It is independent of the particular transmission subtype and requires only a reliable ordered data stream channel. A mail message may pass through a number of intermediate relay or gateway hosts on it’s path from sender to ultimate recipient. (Supplements RFC 821)

The SMTP Model Reference: RFC 2821 Section 2.1

Internet Standards (RFCs) RFC 2822 Internet Message Format – the purpose of the standard is to establish the format of the messages. (Supplements RFC 822) Identification Fields “Though optional, every message SHOULD have a ‘Message-ID:’ field.” The field “provides a unique message identifier that refers to a particular version of a particular message.” It is intended to be “machine readable and not necessarily meaningful to humans.”

Internet Standards (RFCs) Message-ID: The composition of the message-id is represented by the formula: Date/Time Integer Can be formatted to display human readable date/time, but is usually in a hexadecimal string. On Unix systems, the string represents the “number of microseconds since midnight, January 1, 1970, Greenwich Mean Time.” (Unix Time – epoch)

Internet Standards (RFCs) Authentic Message-ID String To convert to human readable change the hex to decimal and use one of the Unix time scripts or one of the websites with a converter. 3989F5A3 = hexadecimal = decimal Aug 3, :43 = Date & Time (+1 hour logs)

Internet Standards (RFCs) Unique id: This is a unique identification assigned in the SMTP process. The domain name of the company is also attached to help ensure global uniqueness. ESMTP id: This is also a unique identification assigned by each intermediate relay or gateway server. This id is also usually in a hexadecimal string that is reset each day. Resulting in an id that can be resolved to a time window on a particular server.

Internet Standards (RFCs) Suspect Message-ID String To convert to human readable change the hex to decimal and use one of the Unix time scripts or one of the websites with a converter. 3989E793 = hexadecimal = decimal Aug 3, :43 = Date & Time (matches log)

Trace Header

Server Logs Typical logs kept for a week or less and then new log spawned. syslog. = 7/30 – 8/4 (current period) syslog.0 = 7/23 – 7/30 syslog.1 = 7/16 – 7/23 syslog.2 = 7/09 – 7/16 syslog.3 = 7/02 – 7/09 syslog.4 = 6/25 – 7/02 syslog.5 = 6/18 – 6/25 syslog.6 = 6/11 – 6/18 syslog.7 = 6/04 – 6/11

Server Logs Analysis of the webmail server logs revealed several issues regarding the validity of the suspect message. Matching trace header timestamps and ESMTP ids revealed that RAA01318 was issued at 17:41:31 to the authentic message. Comparing the 14:41:31 timestamp of the suspect message with the log revealed the server was assigning ESMTP ids beginning with “OAA” not “RRA” as represented in the header.

Server Logs Analysis of the mail server logs confirmed that the suspect message was not authentic. Matching trace header timestamps and ESMTP ids revealed that the authentic Message-ID was logged at 17:41:32 and assigned ESMTP id e73MfW then it was sent to the server and it was assigned a new ESMTP id Comparing the 14:41:32 timestamp of the suspect message with the log revealed the were no messages for over an hour during that time frame.

Outlook Message Properties

Default Outlook Fields

Outlook Client Fields

Notes Message Properties

Spoofs

William L. Farwell, CFE, SCERS Deloitte & Touche, LLP Forensic Investigative Services 200 Berkeley Street Boston, MA Questions?