Tracing an Email by Etienne Takougang by Etienne Takougang.

Slides:



Advertisements
Similar presentations
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Advertisements

Microsoft® Office Outlook® 2003 Training
University of Leeds Academic Services How to use ISS filtering service to remove spam with Outlook Qin Li ISS Service Coordinator
Tracking Unwanted A companion document to Surfing the Information Highway Safely Peter Bilodeau, Educational Consultant (RECIT) Sir Wilfrid Laurier.
Microsoft Office 2007: Introductory Computer Applications 11.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Winmail.dat what it is and what to do with it This guide tells you all about winmail.dat files and the WMDecode decoder Instructions for installing WMDecode.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
PYP002 Intro.to Computer Science Working with 1 Working With Chapter 18.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Tracking the source of spam by examining its header Anh Nguyen May 3 rd, 2010.
1 of 2 Microsoft Outlook 2003 makes it possible to delegate one or more people to read and create items in your Outlook account and to respond to e- mail.
1 of 3 Open Outlook On the Tools menu, click Account Settings. 1 Enable Outlook Anywhere 2 Click your Microsoft Exchange account, and then click.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation. All.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
POP Configuration Microsoft Outlook Express 6.x.
Phishing Analysis. Ojectives Phishing Internet Protocol (IP) addresses Domain Name System (DNS) names Analyse “From” addresses Analyse URL’s Trace the.
Sharing Data Through Internet By: Saud Ahmad Rokhani Data Analyst EPI Cell Sharing Data Through Internet By: Saud Ahmad Rokhani Data Analyst EPI Cell.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Using Microsoft Outlook: Basics. Objectives Guided Tour of Outlook –Identification –Views Basics –Contacts –Folders –Web Access Q&A.
Collaborating with Outlook 2002 and Exchange 2000.
Pasewark & Pasewark 1 Word Lesson 8 Increasing Efficiency Using Word Microsoft Office 2007: Introductory.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
1 Outlook Live Live Messenger SkyDrive Office Live Live Spaces Live Groups.
Company LOGO Exploring Using TWIG (Webmail) at ACC.
Pasewark & Pasewark 1 Outlook Lesson 3 Working with Other Outlook Tools Microsoft Office 2007: Introductory.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Tracing Examples Computer Forensics Tracing Examples.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
1 of 4 Use Microsoft ® Office Communicator 2007 for secure Instant Messaging (IM) your Microsoft ® Exchange Server 2007, MSN, AOL, and Yahoo! contacts.
What is an Merge? Regular mail merge: Write one letter Make a database with individual info The merge automatically personalizes a letter for each.
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Guide to Computer Forensics and Investigations, Second Edition Chapter 13 Investigations.
Microsoft Office Communicator A General Introduction.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
LBTO IssueTrak User’s Manual Norm Cushing version 1.3 August 8th, 2007.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 3: Working with People.
Click your mouse to continue. Ways to Merge Data When you have finished editing your main document and inserting the merge fields, you have several choices.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
AUTO-BUSINESS HOW DO WE USE HYPERLINKS?. Edit an image that represents a hyperlink If a picture, AutoShape, or other graphic is used to represent a hyperlink,
1 of 8 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Using . Creating and Sending Messages The Inbox view serves as Outlook’s interface Click the Inbox icon in the Outlook Bar or Folder List.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Teach Yourself Windows 98 Module 5: Working with and Using Newsgroups.
How to Create an Address How to Create a Free Account, Read and Answer your s. Yahoo! provides FREE . To create a free .
1 of 3 Microsoft ® Office Communicator 2007 can help you perform a wide range of tasks including secure Instant Messaging (IM). With its rich collaboration.
Technical Awareness on Analysis of Headers.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
Go to Start >> Programs >> Outlook Express ( as shown)
CIT 140: Introduction to ITSlide #1 CSC 140: Introduction to IT Electronic Mail.
This opens the box as shown above where filtering on the Junk e mail folder can be adjusted. Click on the Blocked Senders tab. If adding an address.
Word and the Writing Process. To create a document 1.On the Start menu, point to Programs, and then click Microsoft Word. A new document opens in Normal.
This is an introduction to configuring Microsoft Outlook for Office 2010: Forwarding FAMIS work order opening and closing s to other users or alternate.
How to Access an AOL Account with Outlook?
6/11/2018 4:36 AM Services Course Outlook Live Participant Guide
CS3015 Beacon Module 4 Messenger & Setting Preferences
Roadrunner Error 530 Call 1 (888) Toll-free
Exchange Configuration on Outlook Express
Presentation transcript:

Tracing an by Etienne Takougang by Etienne Takougang

Introduction Do you hate Spam? Of course, we all do! Have you ever wondered just who was hiding behind those anonymous s that keep finding their way into your Inbox? Well, this manual will help you detect and identify the origin of these anonymous s. The most convenient way of achieving this goal is to use the program TrackerPro. A free trial version is available at Do you hate Spam? Of course, we all do! Have you ever wondered just who was hiding behind those anonymous s that keep finding their way into your Inbox? Well, this manual will help you detect and identify the origin of these anonymous s. The most convenient way of achieving this goal is to use the program TrackerPro. A free trial version is available at

The first step is to use an analysis tool like TrackerPro, which will automatically analyze an and its headers and provide graphical results similar to the following: Using TrackerPro

n If you do not have an actual , but only have an address, you can use the Tracker tool in VisualRoute to track the user to their server. n An added benefit is that you are able to see what SMTP software the mail server is running (many times with version information as well). n In most cases, using an tracking tool like TrackerPro is your best option. But, if you want to understand how these tracking tools work, continue reading...

Internet Headers Every received has Internet Headers. Using Microsoft Outlook as an example (other mail programs are very similar), just follow these steps to view the headers: Every received has Internet Headers. Using Microsoft Outlook as an example (other mail programs are very similar), just follow these steps to view the headers: n

n 1. Right-click on the mail message that is still in your Outlook that is still in your Outlook Inbox Inbox n 2. Select 'Options...' from the resulting popup menu resulting popup menu n 3. Examine the 'Internet Headers’ in the resulting ‘Message in the resulting ‘Message Options’ dialog box Options’ dialog box

When your full header is not visible on your n Some programs like Hotmail or Yahoo have their full headers hidden by default. n In order to view the full header, you must specifically turn on that option.

Yahoo n 1. Click Options n 2. Click Mail Preferences n 3. Click “Show Headers” n 4. Click “All” n 5. Click Save

Hotmail n 1. Click Options n 2. Click Mail Display Headings (under “Additional Options”) “Additional Options”) n 3. Click “Message Headers” n 4. Click “Full” n 5. Click OK

Example Example What you see when you view the message headers will be very similar to the following:

1: Received: from tes1a623.On .com.sg ([ ]) 1: Received: from tes1a623.On .com.sg ([ ]) by visualroute.com (8.11.6) id f9CIVSk24480; Fri, 12 Oct by visualroute.com (8.11.6) id f9CIVSk24480; Fri, 12 Oct :31: (MDT) :31: (MDT) 2: Message- 2: Message- Id: Id: 3: Received: from drb.com (IIM1608 [ ]) by 3: Received: from drb.com (IIM1608 [ ]) by tes1a623.On .com.sg with SMTP (Microsoft Exchange tes1a623.On .com.sg with SMTP (Microsoft Exchange Internet Mail Service Version ) Internet Mail Service Version ) 4: id 4XNK9ATR; Sat, 13 Oct :19: : id 4XNK9ATR; Sat, 13 Oct :19: : From: 5: From: 6: To: <> 6: To: <> 7: Subject: Long Distance cents per min - NO FEES! 7: Subject: Long Distance cents per min - NO FEES! 8: Date: Fri, 12 Oct :24: : Date: Fri, 12 Oct :24: : X-Sender: 9: X-Sender: 10: X-Mailer: QUALCOMM Windows Eudora Pro Version : X-Mailer: QUALCOMM Windows Eudora Pro Version : Content-Type: text/plain; charset="us-ascii" 11: Content-Type: text/plain; charset="us-ascii" 12: X-Priority: 3 12: X-Priority: 3 13: X-MSMail-Priority: Normal 13: X-MSMail-Priority: Normal 14: X-UIDL: 8`Y!!0GR!!"?H"!k:O!! 14: X-UIDL: 8`Y!!0GR!!"?H"!k:O!! 15: Status: U 15: Status: U

‘Received’ Header The most important header field for tracking purposes is the Received header field, which usually has a syntax similar to: The most important header field for tracking purposes is the Received header field, which usually has a syntax similar to: Received: Received: from ? by ? via ? with ? id ? id ? for ? date-time

Sender’s IP Address What is crucial for tracking, is to pay attention to the trail of IP-address in the from tokens and not necessarily the host name provided to us in the by tokens: What is crucial for tracking, is to pay attention to the trail of IP-address in the from tokens and not necessarily the host name provided to us in the by tokens: Received: Received: n from tes1a623.On .com.sg ([ ]) n by visualroute.com (8.11.6) n id f9CIVSk24480; n Fri, 12 Oct :31: (MDT)

Track the IP Address n Use TrackerPro to track the IP Address! Track down the person! The resulting trace will look somewhat like the following generic trace:

Conclusion As a result, by using TrackerPro and analyzing message headers, you are fully capable of tracing that mysterious . You can now take action and rest easy. As a result, by using TrackerPro and analyzing message headers, you are fully capable of tracing that mysterious . You can now take action and rest easy.

Merry Christmas and Happy New Year! Merry Christmas and Happy New Year!

THE END