Module 2 - E-mail Flashcards
E-mail threats (3)
- inbound email allowed by design
- can be spoofed (if not digitally signed)
- two paths (corporate system, personal/web-based)
Spam Characteristics
- unsolicited commercial e-mail
- no valid reply address
- no affiliation with recipient
- no ability to opt-out
- sale of goods or services
Phishing Attack
email tailored to an org or group of individuals
- malicious payload (exe, office with macros, PDFs with Javascript, hyperlinks)
Spear Phishing Attack
- Target individuals (executives, senior mgmt, executive assistants, IT Staff)
Whaling attacks
form of spear phishing
Targets executives, senior mgmt
Email artifacts for threats
- within e-mail
- browser or app that establishes outbound connection
- firewall/server logs
Email Analysis (within)
email header (proof of delivery, sender and return-path, servers/IP addresses)
body
attachments
Email Header correlations
Return-Path and From
X-Mailer with user and IP
Delivered-To and To (could be OK if BCC)
Email locations (5)
Mail server Journaling (if SOX compliant) Local containers within profiles temporary internet files temp directories contain attachments
Public IP and Emails
Yahoo appends public IP of sender to e-mails
Google does not.
Outlook Personal Folders (location)
C:\users\%username%\Local\Application Data\Microsoft\Outlook\
Thunderbird Mail (location)
%USERPROFILE%\Application Data\Thunderbird\Profiles\XXXXXXXX.default\Mail\
Windows.edb
C:\ProgramData\Microsoft\Search\Data\Application\Windows
-Windows indexer for searching