500.4 - Email, Key Additional Artifacts, and Event Logs Flashcards
E-mail Forensics Overview
- Who, When, Where, Relevant
- Host-based, servers, Cloud, Mobile
- What can we Analyze?
- Mail Header, Message Body, Attachment
E-mail Headers
- Message-ID - Unique Fingerprint
- Received - Who sent the email - Start @ bottom - In reverse order
- X-Originating-IP - Client IP Address (Public = Off)
- X-Mailer - What client program generated the email
Email Authenticity
- Valid SPF & DKIM increases trust
- Sender Policy Framework (SPF) - Validate sending IP Address to Orig. Domain
- DomainKeys Identified Mail (DKIM) - Verifies that message content has not changed via Dig. Signal
Message-ID Threading (References and In-Reply-To)
- Message - IDs can be used to identify related emails (thread) via Refs & In-Reply to
Extended MAPI Headers
- Tracks Add’tl timestamps, unique IDs, Last Action)
- Messaging Architecture - Core component of Exchange & Outlook
Host-Based E-mail
- On Local Machine, Identify email locations, deleted email archives
Microsoft Outlook - File Ext: (.PST)
- Email Archive stored by default,
- Encrypted/Obfuscation by default
- Up to 5GB saved
Location
- “User”\AppData\Local\Microsoft\Outlook (2010 & earlier)
- “User”\Documents\Outlook (2013/2016)
- HKCU\Software\Microsoft\WindowsNT\CurrentVersion\WindowsMessagingSubSystem\Profiles\Outlook
Offline Folder Files (.OST)
- Cached Exchange Mode (Offline mail access)
- Syncs with Server
- Locally Stored, 50 GB
Location
- C:\Documents&Settings"User”\Local Settings\Application Data\Microsoft\Outlook
Outlook Attachment Recovery
- Uses a “Secure Temp Folder” to open attachments
- Located under Internet Explorer cache folders - Temporary Internet Files (-Win10) and INetCache (+IE11)
- Previewed and Opened attachs. Can be recovered
- Prior to 2007, attachments persisted until Disk Cleanup
- After 2007 attachments remain only if message/outlook is closed before the attachment
Location
- AppData\Local\Microsoft\Windows\Temporary Internet Files\ Content.Outlook
- AppData\Local\Microsoft\Windows\INetCache\Content.outlook (IE11+)
- HKCU\Software\Microsoft\Office"Version”\Outlook\Security\OutlookSecureTempFolder
E-mail Encryption
- Individual message encryption is most common
- Uses public-key protocol like Secure MIME (S/MIME) or PGP/ MIME (.pgp, .p7m file extensions)
- Not decrypted en route
- Encrypted messages will show …
- – Begin PGP Message —
- – End PGP Message —
Microsoft Exchange (.edb, ese, .stm)
- Is a database for Users Mailbox,
- (2007 +) in .EDB format
- Extensible Storage Engine (ESE) format & previously .EDB & .STM files composed database
- .EDB stores mail, attachments, contacts, Journal, notes, tasks, calendar, & address book entries
- .log files contain messages not yet written to .EDB
- Can be exported in .PST file format
Location
- C:\ProgramFiles\Microsoft\ExchangeServer\Mailbob\FirstStorageGroup\MailboxDatabase.edb
“Recoverable Items” in Exchange
- Deletions - Items removed from users Deleted Items Folder; Deleted mail from POP or IMAP accounts
- Purges - Temp location for hard-deleted items from Deletions folder & items that exceed retention period
- Discovery Hold - Deleted items from mailboxes placed hold
- Versions - Copy-on-write changes to items in active mailboxes placed on hold
- Audits - Audit log entries for mailboxes with auditing enabled
- Calendar Logging - Calendar changes when calendar logging is enabled
- Message Tracing - log showing message defaults of sent & received mail
- Email retained for 14 days, & mailboxes for 30days
- 2010 includes indexing & retention for ALL deleted objects
- Maintains versions of emails
- Can freeze logs to prevent deletion
- Unread emails still in “transit”
Online Acquisition Windows Server Backup
- Used with Win 2008 + / Exchange 2007 +
- Uses Volume shadow copies
- ensures database consistency
- can not backup and restore individual mailboxes
- Exchange databases must be stored together
- Backups stored as VHD files
Unified Audit Logs in O365
- Search & Export logs
- Exchange Online, Sharepoint Online, OneDrive for Buisness, Azure AD
- Not enabled by default
- has to be turned on for EACH user - 90 day retention
- No default logging for owners, viewed messages only for Admin users, No logg off events, IP & client included
Webmail Forensics
- Emails normally stored on ISP servers
- Possible exception for POP or IMAP
- User IP address & subscriber info may be available for ISP
- Look for webmail addresses
- Cached copies can be recovered
- Can perform keyword searching & carving of webmail fragments
- Protected storage & auto complete functions
Compressed Webmail Remnants
- Webmail is often compressed
- Cache may not be in HTML format
- File signature analysis might be required to identify compressed zip files