WebMail Forensics. Thomas Akin, CISSP. Director, Southeast Cybercrime Institute Kennesaw State University



Similar documents
Anonymity on the Internet Over Proxy Servers

Configuring your client to connect to your Exchange mailbox

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

Webmail Instruction Guide

Basics Webmail versus Internet Mail

Configuring Internet Explorer for Voyager on Client Computers

Mail by Joshua. 1. Mailing System

Hiding Tracks on the Net

Setup Corporate (Microsoft Exchange) . This tutorial will walk you through the steps of setting up your corporate account.

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.

Regain Your Privacy on the Internet

Secure Client Guide

Using Rackspace Webmail

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

F-Secure Internet Security 2012

Infor Xtreme Browser References

POP3 Connector for Exchange - Configuration

Nokia E90 Communicator support

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

ModusMail Software Instructions.

Background Information

1. How to Register Forgot Password Login to MailTrack Webmail Accessing MailTrack message Centre... 6

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

1 Accessing accounts on the Axxess Mail Server

Internet Privacy Options

An Insight into Cookie Security

Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit

ConvincingMail.com Marketing Solution Manual. Contents

WEBMAIL User s Manual

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Introduction to the AirWatch Browser Guide

Using the Web service

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Version 1.0 January Xerox Phaser 3635MFP Extensible Interface Platform

HTTPS GATEWAY INSTRUCTIONS

-- Reading and Printing

FORWARDING (directed to a non-gcccd account) Revised 1/15/14

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

WEB2CS INSTALLATION GUIDE

CallPilot. Release 2.0. My CallPilot User Guide

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

GUIDEWIRE. Introduction to Using WebMail. macrobatix. Learn how to: august 2008

EURECOM VPN SSL for students User s guide

IIS Sites Transfer 2.0 Quick Start Guide

Interwise Connect. Working with Reverse Proxy Version 7.x

Outlook Web Access (OWA) for Staff

To open and/or save an attachment:

Using Webmail. Document Updated: 9/08. Technical Manual: User Guide. The Webmail Window. Displaying and Hiding the Full Header.

Class Outline. Part 1 - Introduction Explaining Parts of an address Types of services Acquiring an account

DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD

Secure Management Guide. June 2008

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Use your UNNCNetID and password to log in. The first time you login to the system, you may receive the following screen:

Startup guide for Zimonitor

NETWORKS AND THE INTERNET

Using Internet or Windows Explorer to Upload Your Site

Deploying RSA ClearTrust with the FirePass controller

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Registering at the Secur site

How to Make the Client IP Address Available to the Back-end Server

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Outlook Web Access Tipsheets

Jobs Guide Identity Manager February 10, 2012

System Administration Training

Encryption Recipient Guidelines

e- storage Mail Archive

What really is a Service?

IIS, FTP Server and Windows

Client Administrator Quick Reference Guide

Departmental (Service) Account Set Up

Proxies. Chapter 4. Network & Security Gildas Avoine

Troubleshooting IMAP Clients and ViewMail for Outlook in Cisco Unity Connection 8.x

Load testing with. WAPT Cloud. Quick Start Guide

Secure FAQs for External Stakeholders

WebEx Remote Access White Paper. The CBORD Group, Inc.

What is Web Security? Motivation

Hardware/Software Recommendations And System Support Reference Information November 10, 2004

Networks and the Internet A Primer for Prosecutors and Investigators

Connecting an Android to a FortiGate with SSL VPN

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)

Iowa IDEA Supported Browsers and Settings July 1, 2013 Release

DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0

Computer Networking LAB 2 HTTP

Reverse Proxy Guide. Version 2.0 April 2016

How To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub

WebScheduler TotalFBO TotalFBO Initial Installation TotalFBO Connecting to a Database TotalFBO

WebCUR ListServ. ListServ Help Manual

How To Use Touchtone.Com'S Digital Phone Service Web Portal User Guide (For Ip Phones) On A Pc Or Ip Phone (For A Cell Phone) On Pc Or Mac) On Your Ip Phone On A Mac Or Ip Cell Phone On

U.S. Bank Secure Mail

Cyclope Internet Filtering Proxy. - Installation Guide -

Elluminate Live! Access Guide. Page 1 of 7

Active Directory Self-Service FAQ

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

TELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE

Setting Up One Search

WEB2CS INSTALLATION GUIDE

Owner of the content within this article is Written by Marc Grote

Transcription:

WebMail Forensics Thomas Akin, CISSP Director, Southeast Cybercrime Institute Kennesaw State University

Overview Web Browser Forensics Internet Explorer Netscape WebMail Services Cookies, History, & Cache, oh my WebMail Headers Obscuring WebMail Headers Yahoo! Mail History, Cache, URLs Hotmail History, Cache, URLs Helpful Tools Other Services Hushmail Ziplip

Web Browser Forensics Internet Explorer Internet Favorites Cookies History Typed URLs Temporary Internet Files Autocompletion Netscape Bookmarks Contacts History Preferences Typed URLs Cookies Cache

Favorites

Cookies

History

Typed URLs

Temporary Internet Files

Auto-completion

WebMail Clients Web based email clients are susceptible to the same problems of all clients that utilize web browsers: Browsers store tons of data on the local hard drive.

Key to WebMail Forensics The user must perform some action that causes the page to be cached on the system i.e. Reading a Message bring the message up in the browser and causes it to be cached. Sending a message does not since the browser doesn t display the sent message...

WebMail Headers In addition to standard email headers, most webmail clients contain useful information on their origin:

Obscuring WebMail Headers Open Relay False Received From Headers Anonymizer Open Proxy SSH Tunnel (or port redirector)

Open Relays Spoofers use Open Relays to attempt to hide the person and IP address of the system that sent the email. By itself, email sent through open relays still contains the IP address of the actual sender. Combined with other techniques, open relays can be a hindrance to investigations.

Open Relay Where to look for evidence: Email Header will contain the originating IP address. Open Relay log files will also contain the originating IP address.

False Received From Header Leads the investigator to the wrong server by adding a seemingly valid Received: from header. To avoid detection, the spoofer s real address will be recorded somewhere in the Received: from headers, but the investigator will not know which one.

False Received From Header

False Received From Header

False Received From Header Where to look for evidence Email Received: from headers will contain the actual IP address of the originating system, you just won t know which Received: from header is correct. Trace backwards by looking at the log files of the servers the email claims to have passed through. Once you get to a server the has no record of the email, the previous system is the originating IP.

Anonymizer (Web)

Anonymizer (Web) Email sent from IP address 64.32.161.244

Anonymizer (Web) Where to look for evidence: The email headers and web mail log files will point back to the anonymizer. You will need to look at the anonymizer s log files to determine what IP address accessed the web email account at the specific time the email was sent. If the anonymizer is a paying service then you can also request subscriber information for the account that was using the anonymizer to send the web based email.

Open Proxy

Open Proxy Email sent from IP address 64.32.161.244

Open Proxy Where to look for evidence: The email headers and web based email logs will contain the IP address of the open proxy. The Open Proxy log files will contain the IP address of the originating system.

Anon SSH Tunnel

Anon SSH Tunnel Email sent from IP address 64.32.161.244

Anon SSH Tunnel Where to look for evidence: The email headers will contain the IP address of the SSH server the person was logged into. SSH servers, by default, do not record what tunnels are created through them. SSH servers do record login information so you will need to determine who was logged into the system through ssh at the time the email was sent. One of these log entries will be the originating IP.

Combining Techniques: Tunnels with an Open Proxy Spoofer uses a SSH Client connects to a SSH Server creating a tunnel to an Open Proxy port 80 (usually) Spoofer then reconfigures their browser to connect to the SSH Tunnel which is redirected to the Open Proxy port 80. They then browse to a web based email system and send their email. The headers record the IP address of the Open Proxy, not the originating system.

Combining Techniques: Tunnel with an Open Proxy Where to look for evidence: The email headers and web based email logs will contain the IP address of the Open Proxy. The Open Proxy logs files will contain the IP address of the SSH server used. SSH tunnels are not logged, so you will have to determine who was logged into the server through ssh at the time the email was sent. One of these will be the originating IP.

Local Analysis

Yahoo! Mail & HotMail Index.dat & fat.db Cache Files Typed URLs Auto-completion Cookies History Files

Live Examples: Cookies Examples Live Example: History Files Live Example: URL interpretation Live Example: Manually Parsing index.dat

Tools to make your life easier Web Cache Illuminator (www.nstarsolutions.com) Cache Monitor (www.webattack.com) Cache Auditor (www.webattack.com) Internet Cache Explorer (www.webattack.com) STG Cache Audit (www.webattack.com)

My Favorites Internet Explorer Cache Auditor Internet Cache Explorer Netscape Web Cache Illuminator

IE s Cache (Internet Cache Explorer)

IE Cache for Yahoo! Mail Specifically look for yahoo URLs containing: Compose ShowFolder ShowLetter Preferences Options Login Examples

IE s Cache (Internet Cache Explorer)

Web Cache Illuminator & Netscape

Web Cache Illuminator & Netscape

Live Examples Live examples of retrieving WebMail information: Received emails Sent emails Folders Address books

Network Forensics Using Sniffers to capture webmail data Clear http Encryped https Login & Password recovery Capturing both incoming & outgoing email text

Other Options How clients such as Hushmail, ZipLip, and Anonymous Remalers are attempting to enhance email privacy: Hushmail ZipLip Anonymizers Etc

Thank you Questions? Thomas Akin Southeast Cybercrime Institute Kennesaw State University 1000 Chastain Road #3301 Kennesaw, GA 30144-5591 takin@kennesaw.edu www.cybercrime.kennesaw.edu