Book Image

Learn Computer Forensics – 2nd edition - Second Edition

By : William Oettinger
Book Image

Learn Computer Forensics – 2nd edition - Second Edition

By: William Oettinger

Overview of this book

Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report. This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process. By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator.
Table of Contents (17 chapters)
15
Other Books You May Enjoy
16
Index

Decoding email

An email has many unique identifiers for a digital forensic investigator to identify and track down. The mailbox and domain name, along with the message ID, will allow a digital forensic investigator to serve judicially approved subpoenas/search warrants on the vendor to follow any investigative leads.

In this section, we will break down the email header one section at a time so that you can decide how to conduct your investigation. First, we will start by discussing the email envelope.

Understanding the email message format

The vast majority of email users are only familiar with basic email information, such as this:

Subject background checks 
Date 07/19/2008 23:39:57 +0 
Sender [email protected] 
Recipients [email protected] 

We are back to dealing with our friend Jean, and by looking at the email, we can see several fields commonly associated with an email. Here, we know the subject, background checks, the date and time when the user sent the email,...