Тёмный

Email Header Analysis and Forensic Investigation 

13Cubed
Подписаться 52 тыс.
Просмотров 149 тыс.
50% 1

Опубликовано:

 

14 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 65   
@omniomi
@omniomi 3 года назад
Great video! The description of the SPF qualifiers on the "all" mechanism isn't quite right though. Your description is a common misconception I encounter on security and admin forums frequently. The difference in handling of ~all and -all failures is entirely a matter of local policy on the side of the receiver. Senders should strive to get their records to -all but the difference in how imposter mail will be treated isn't as stark as one may think. The softfail description is somewhat correct in that the RFC specifies the receiver "SHOULD NOT" reject (note it doesn't say "MUST NOT".) However, accepted is not the same as delivered and the message may still be quarantined or otherwise prevented from ultimately ending up in the recipient's mailbox. The RFC on fail (-all) is almost the same but says >>>if>chooses
@13Cubed
@13Cubed 3 года назад
I appreciate the detailed insight, and will pin this comment.
@omniomi
@omniomi 3 года назад
@@13Cubed just to reiterate: Your video is great. The content is accurate, useful, and easy to follow. Email security is just my entire job and before that I was basically a postmaster so I can depressingly quote all of the relevant RFCs from memory haha :D I think the misconception about how -all and ~all are handled is because in an ideal world the way you described it would be true. In practice though so many legitimate messages fail SPF for a myriad of reasons so filter vendors err on the side of accept but be suspicious unless there's a DMARC record with p=reject. Even then some still accept but quarantine (looking at you Office 365.)
@13Cubed
@13Cubed 3 года назад
@@omniomi Makes sense - thanks!
@jeffp1519
@jeffp1519 4 года назад
I've been doing some form of email forensics for years, and this is one of the best explanations that I've seen. Great job. I'd welcome much more of this, as well as Mac, Linux and database forensics. Cheers.
@peterream6508
@peterream6508 3 года назад
This a fantastic analysis and should be required watching for anyone that analyzes email for a living. Would recommend!
@krisshaa8079
@krisshaa8079 3 года назад
This is a life saver. i learned more in 20 minutes then 3 hours reading documentation
@tehpizzarollz
@tehpizzarollz Год назад
Awesome video. Also, you sound like the narrator on The Sandlot which is pretty cool.
@jackbaylor6737
@jackbaylor6737 4 года назад
Superbly broken down and well narrated. Very engaging. Looking forward to more!
@samjohn1098
@samjohn1098 4 года назад
Expecting some Mac Forensics from 13Cubed atleast a start
@zdog34whatnow
@zdog34whatnow 4 года назад
Best forensics resource I’ve found! You are the man
@pedromatos8406
@pedromatos8406 3 года назад
Thank you for this very clear explanation, indeed one of the best explanations out there. Please continue doing videos like this.
@gauravkaintura
@gauravkaintura 4 года назад
Just came across your channel, great technical article explanation ..... appreciate your work
@abrahamissacjacob4018
@abrahamissacjacob4018 4 года назад
SPF and DKIM sounded so simple. Great video Richard, as always!!
@TheAnurag69
@TheAnurag69 3 года назад
Best teacher I have ever come across.
@vinaykumar-pn5le
@vinaykumar-pn5le 4 года назад
Nice Experience .Thanks For your kind information.
@saipraveen1382
@saipraveen1382 4 года назад
Soo useful video for Email forensic and for common people to safeguard themself from phishing emails. Love the way presented and Thanks a lot :)
@hasky9813
@hasky9813 4 года назад
This a a great explanation, really helps with GCFE prep!
@sierratango69
@sierratango69 4 года назад
I'm taking SANS FOR500 soon - great to know this is relevant to the exam :)
@SecureTheWorld
@SecureTheWorld 4 года назад
this is the best video I have seen on Mail Headers, awesome!
@SuperChelseaSW6
@SuperChelseaSW6 4 года назад
Let's hit 20k . Ur vlogs are awesome
@ahmedelhabashi9341
@ahmedelhabashi9341 4 года назад
Great new video and your explain is awesome... keep going , Thanks
@mysketchbook9630
@mysketchbook9630 4 года назад
Simply great & thanks for sharing.
@lautarob
@lautarob 4 года назад
Excellent! (as usual). Thank you very much
@ericksonpogs
@ericksonpogs 4 года назад
Watching this video led me to subscribe to your channel. Thanks for sharing this and keep up the good work.
4 года назад
Again, great video Can you explain how reconnaissance email (not email reconnaissance) the one some APTs use to put an url to verify if the email exists or not without clicking the link? thank you
@13Cubed
@13Cubed 4 года назад
Hidden tracking pixels and things of that nature are pretty common and can show whether or not someone opened a message without clicking a link. Is that what you’re referring to?
4 года назад
@@13Cubed Yes Thank you
@mindtropy
@mindtropy 4 года назад
thanks! can you share a "hard example" of it that we can practice on
@13Cubed
@13Cubed 4 года назад
Just send an email from one account to another and look at some of the header fields we've covered here. That's by far the easiest way to become familiar with how to read and interpret the data.
@mindtropy
@mindtropy 4 года назад
@@13Cubed thanks for the quick response, i'll try it
@gerardocaudillo1902
@gerardocaudillo1902 4 года назад
Great as always!
@annafan83
@annafan83 4 года назад
Good episode and nice office wall ^^
@justingtq13
@justingtq13 4 года назад
Hey, Thanks for the great video. Lot of cool and needed information. I had a quick question though. How does the MX record and SPF authorised sender differ? I mean can they both be the same too?
@ciaobello1261
@ciaobello1261 4 года назад
great video.. very good explain👍👍
@jag831
@jag831 4 года назад
Priceless... thank you!
@sulthansk6444
@sulthansk6444 4 года назад
Thanks for the video...
@brink668
@brink668 4 года назад
Nice shirt and yes nice wall.
@abhijitshetty7338
@abhijitshetty7338 4 года назад
very informative indeed. Loved it.
@beastface5123
@beastface5123 4 года назад
Where do I get that 13 cubed polo? :)
@13Cubed
@13Cubed 4 года назад
I'm going to be ordering some for giveaway in the next couple of months.
@dhustla15
@dhustla15 3 года назад
I am sure this is a simple step I am missing but how do you migrate the email to sublime text for analysis?
@13Cubed
@13Cubed 3 года назад
Using your mail client, view the mail headers. Then, just copy/paste those headers into Sublime Text, and choose the "Email Header" plugin in the bottom right.
@SuperChelseaSW6
@SuperChelseaSW6 4 года назад
Hello sir. make demo how fmem works for capturing linux memory . Thanks
@sijsu
@sijsu 4 года назад
Great, thanks!
@samjohn1098
@samjohn1098 4 года назад
Good one
@Cubear99
@Cubear99 4 года назад
Does all e-mails should have DKIM?
@13Cubed
@13Cubed 4 года назад
No, not everyone has configured DKIM, though messages sent from any major email service or company should include DKIM signatures.
@Drusher10
@Drusher10 3 года назад
Sir, amazing video :D
@Deezeone
@Deezeone 4 года назад
how to get the ip from a google email??
@afriq911
@afriq911 4 года назад
Thanks
@nitricdx
@nitricdx 4 года назад
What does a localhost ip mean for the first Received field?
@13Cubed
@13Cubed 4 года назад
This might help explain: serverfault.com/questions/522066/what-does-this-received-email-header-line-mean
@hangmalim6549
@hangmalim6549 3 года назад
i installed packet control but it dont show up in sublime, why? i am stock in the beginning phase. help me out
@13Cubed
@13Cubed 3 года назад
Go to Tools > Command Palette, then look for Package Control, Install Package. Search for "email header" and you should find it.
@ab866
@ab866 4 года назад
Can you please suggest some good book to understand Email Security in detail.
@13Cubed
@13Cubed 4 года назад
Not sure of any books, but plenty of online resources.
@DonVTOL
@DonVTOL 4 года назад
I tried this on an email and I don't get anywhere near as much information as you have. Any help would be greatly appreciated. Thanks
@13Cubed
@13Cubed 4 года назад
What do you see? How are you viewing the headers (e.g. what mail client are you using)?
@courtneylyle1454
@courtneylyle1454 4 года назад
@@13Cubed This information was helpful in understanding but I am still unable to decipher the original sender location of an email from a gmail account. I have emails both sent and received, and determining if the sender is in my state or not would really help me in knowing who is behind the account. Can you help?
@rafaeltrindade1867
@rafaeltrindade1867 4 года назад
Hey, i tried it with a .msg extension i get the encryption message, am i doing something wrong or missing something. Tks in advance great video!
@13Cubed
@13Cubed 4 года назад
MSG files are usually associated with Microsoft Outlook, and aren’t going to be readable in plain text. You’ll need to view the headers within that application and copy and paste them into a separate file for analysis (or otherwise convert the MSG to EML via a third-party application).
@rafaeltrindade1867
@rafaeltrindade1867 4 года назад
@@13Cubed Yeah copy pasting works out, thanks!! :)
@D_Tech_And_Trek
@D_Tech_And_Trek 4 года назад
how do criminals spoof email header? Thanks.
Далее
ТИПИЧНОЕ ПОВЕДЕНИЕ МАМЫ
00:21
Просмотров 1,1 млн
Introduction to Windows Forensics
1:04:33
Просмотров 174 тыс.
Email Headers Explained and How They Might Help You
25:32
Phishing Email Analysis #Part1
42:09
Просмотров 27 тыс.
Email Header Analysis and Digital Forensics
1:03:09
Просмотров 18 тыс.
Forensic Investigation of Email Client Tool Marks
35:21