fbpx

e-mail

informations

Ralph, a professional hacker, targeted Jane , who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane’s company using this opportunity and gathered sensitive informations by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on Jane?

Ralph, a professional hacker, targeted Jane , who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane’s company using this opportunity and gathered sensitive informations by scanning terminals for passwords, searching for important documents …

Ralph, a professional hacker, targeted Jane , who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane’s company using this opportunity and gathered sensitive informations by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on Jane? Read More »

E-Mail Forensic Tools

E-Mail Forensic Tools

There are many email forensic tools which can assist within the study of source and content of e-mail message so that an attack or the malicious intent of the intrusions could also be investigated. These tools while providing easy to use browser format, automated reports, and other features, help to spot the origin and destination of the message, trace the trail traversed by the message; identify spam and phishing networks, etc. This section introduces a …

E-Mail Forensic Tools Read More »

E-Mail Forensic Investigation Techniques

E-Mail Forensic Investigation Techniques

E-mail forensics refers to the study of source and content of e-mail as evidence to spot the actual sender and recipient of a message, data/time of transmission, detailed record of e-mail transaction, intent of the sender, etc. This study involves investigation of metadata, keyword searching, port scanning, etc. for authorship attribution and identification of e-mail scams. Various approaches that are used for e-mail forensic are described in and are briefly defined below: 5.1. Header Analysis …

E-Mail Forensic Investigation Techniques Read More »

what is email foreniscs (2)

What is Email Forensic Investigation

Email forensics may be a branch of digital forensic science that focuses on investigation of emails to gather digital evidence for crimes and incidents. It comprises in-depth & systematic examination of emails, especially aspects like message transmission routes, attached files and documents, IP addresses of servers and computers, etc. Email forensics professionals use a number of the subsequent common techniques to look at emails and collect digital evidence: 1. Email Header Analysis Email headers contain …

What is Email Forensic Investigation Read More »