© Nihad A. Hassan 2019
Nihad A. HassanDigital Forensics Basicshttps://doi.org/10.1007/978-1-4842-3838-7_8

8. Web Browser and E-mail Forensics

Nihad A. Hassan1 
(1)
New York, New York, USA
 

Investigating web browsers and e-mail messages for forensics artifacts

Internet applications already installed on Windows can give important information about user actions performed previously on his/her computer. For instance, a web browser is the only way to access the Internet, and criminals are using it to commit crimes related to the Internet or to target other users online. Internet users use web browsers to socialize, purchase online items, or to send e-mails and browse the web contents, among other things. This fact makes web browsers the preferred target for malicious actors to steal confidential information like account credentials.

Note!

The main sources of malware/spyware/adware are e-mails in addition to social networking web sites, and all these resources are usually accessed using web browsers.

Analyzing web browser artifacts is a major part of any computer forensic investigation, as it can effectively in many cases determine the source of compromise or the user’s previous activities. For example, if we investigate web browsers and see that the suspect was downloading or searching online for information on steganography and encryption tools, this will give a clear sign that this user may employ such techniques to conceal secret data.

In this chapter, we will describe how to investigate different web browsers for interesting leads that can help us to solve the case at hand. E-mail also plays an integral role in today’s digital age communications; understanding how to analyze e-mail messages to find clues will also get covered in a dedicated section.

Web Browser Forensics

As of September 2018, the web browser market share was mainly divided between Google Chrome (67.88%), Mozilla Firefox (10.94%) and Internet Browser (6.45%) from Microsoft.1 The focus of the first section will be on using various digital forensic techniques to analyze artifacts from these three major web browsers.

Note!

To keep the privacy of the end users, different web browsers introduce special configuration known as Private Browsing (Firefox) or Incognito Mode (Google Chrome), which allows a user to browse the web without storing local data that can reveal a user’s previous web activity on his/her machine. When this mode is activated, information like browsing history, cookies, form and search bar entries, download list history, entered passwords, and offline web contents will get deleted upon closing the browser. Tracking protection will also get activated as a part of this configuration, preventing web sites from tracking user browsing history across multiple sites.

The focus of this book is on Windows systems, so we will begin with the Windows default web browser, Internet Explorer (IE), and its new successor, Microsoft Edge.

IE

IE comes preinstalled with all versions of Windows. Its main registry key is located at HKEY_CURRENT_USERSoftwareMicrosoftInternet Explorer. You will notice that under this key there are many keys; however, we are mainly concerned with the following ones.
  • HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain This key stores IE configuration settings like the home page, search bar, default search engine, and so on.

  • HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerTypedURLs The TypedURLs key maintains a list of the URLs the user types in the address bar in IE (see Figure 8-1).
    ../images/465906_1_En_8_Chapter/465906_1_En_8_Fig1_HTML.jpg
    Figure 8-1

    Windows showing previous URLs and their associated access dates/times entered by a particular user of IE

  • HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerTypedURLsTime Reveals the browsing time (visit time) when a particular URL (from the previous key [TypedURLs]) was accessed. The date/time value is stored in binary, so convert it using the DCode tool, as we have done many times before (see Figure 8-1).

IE (version 9 and below) uses a file called index.dat; this is a database file used to improve the overall performance of IE by indexing various contents (e.g., store all the URLs you have visited using IE in addition to search queries, cookies, and recently opened files) in one place to offer a more customized experience for the user. For example, when a user wants to access a previously visited web page, IE can autocomplete the web address as the user types it in the browser address bar by retrieving browsing history from a particular index.dat file.

The location of index.dat files is different for each version of Windows; for instance, index.dat files in Windows 7 can be found at the following locations:
Users<UserName>AppDataRoamingMicrosoftWindowsCookiesindex.dat
Users<UserName>AppDataRoamingMicrosoftWindowsCookiesLowindex.dat

Other locations of index.dat files in various Windows versions can be found at www.milincorporated.com/a2_index.dat.html .

Newer versions of IE (versions 10 and 11), which come preinstalled with Windows 8 and 10, do not have index.dat files; instead they use a file called “WebCacheV01.dat” to store all user browsing information (the information that was previously handled by the index.dat file). This file can be found at
Users<UserName>AppDataLocalMicrosoftWindowsWebCacheWebCacheV01.dat
We can automate the IE investigation task by using specialized tools. Nirsoft offers many tools that can simplify this issue; here is a list of IE forensic tools from Nirsoft:
  1. 1.

    IEHistoryView ( www.nirsoft.net/utils/iehv.html ): Displays browser history from index.dat files (up to IE version 9).

     
  2. 2.

    IECacheView ( www.nirsoft.net/utils/ie_cache_viewer.html ): Displays all cache folder contents of IE (supports IE versions 6.0-11.0).

     
  3. 3.

    IECookiesView ( www.nirsoft.net/utils/iecookies.html ): Display all cookies saved by IE.

     
  4. 4.

    IE PassView ( www.nirsoft.net/utils/internet_explorer_password.html ): Display all passwords stored by IE. This tool supports a modern version of IE like 10 and 11 in addition to Microsoft Edge.

     

Microsoft Edge Web Browser

Microsoft Edge (code name Spartan) is the replacement of the IE browser and the default browser for Windows 10. This is a lightweight web browser that integrates with the Cortana feature available in Windows 10, allowing a user to complete many tasks (e.g., open web pages, conduct online searches) using voice commands only.

From a forensics perspective, we can expect more users to use Microsoft Edge instead of IE, so knowing where this browser stores its data is essential for our forensics work.

Note!

IE version 11 comes preinstalled side by side with Edge on Windows 10.

Edge browser storage relies on an ESE database to store its configuration settings; the database is located at
Users<UserName>AppDataLocalPackagesMicrosoft.MicrosoftEdge_xxxxACMicrosoftEdgeUserDefaultDataStoreData ouser1xxxx-xxxDBStorespartan.edb
We can use the ESEDatabaseView from Nirsoft ( www.nirsoft.net/utils/ese_database_view.html ) to display data within the Spartan.edb database (see Figure 8-2).
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig2_HTML.jpg
Figure 8-2

Display database scheme of Spartan.edb using ESDatabaseView from Nirsoft; image display saved web favorites in the “Favorites” container

Microsoft Edge cache content is stored at
Users<UserName>AppDataLocalPackagesMicrosoft.MicrosoftEdge_*****AC#!001MicrosoftEdgeCache
Microsoft Edge stores its browsing history in the same location (same database file) where IE version 10 and 11 store their data!
Users<UserName>AppDataLocalMicrosoftWindowsWebCacheWebCacheV01.dat
The last browsing session of Microsoft Edge is stored at
Users<UserName>AppDataLocalPackagesMicrosoft.MicrosoftEdge_****ACMicrosoftEdgeUserDefaultRecoveryActive

Further analysis of Edge artifacts can reveal valuable forensics information; as we already saw, the valuable information is located in the Edge databases named spartan.edb and WebCacheV01.dat and in various locations inside its main folder, located at:Users<UserName>AppDataLocalPackagesMicrosoft.MicrosoftEdge_*****

Firefox

Firefox is a free, open source web browser developed by Mozilla; it is considered among the most used web browsers in the world. Firefox does not use the Windows registry in the same way as the IE browser; Firefox stores its web history, download history, and bookmarks in a central database file named places.sqlite. This file exists within your Firefox profile. You can access your profile by pressing the Windows key and typing the following:
%APPDATA%MozillaFirefoxProfiles

In the search box, your Firefox profile will appear in the search result as a folder; click to access it.

Note!

You can also access the Firefox profile folder by pressing Windows button + R, and then typing the following in the Run window: %APPDATA%.

Now click OK. A Windows Explorer window will appear. Go to Mozilla ➤ Firefox ➤ Profiles.

What we care about in our forensic search are the files surrounded with squares, as shown in Figure 8-3. We’ll describe each one briefly and suggest tools to automate our search:

  1. 1.

    places.sqlite: Holds bookmarks, visited web sites, and download history.

    The following tools can be used to retrieve information from the places.sqlite database file:
     
  2. 2.

    cookies.sqlite : Stores cookies planted by web sites you already visited (cookies are usually used to save login usernames and passwords of previously visited web sites and/or to store web site preferences where applicable).

    The following tools can be used to retrieve information from cookies.sqlite database file:
    • MZCookiesView ( www.nirsoft.net/utils/mzcv.html ). Displays all cookies stored in a Firefox cookie file; you can also export results into a text, XML, or HTML file.

    • DB Browser for SQLite.

     
  3. 3.

    formhistory.sqlite: Stores your search keywords used in Firefox search bar and your searches entered into web forms.

     
  4. 4.

    key4.db and logins.json: Here is where Firefox saves your passwords. (Older versions of Firefox use the name key3.db for the key database file; beginning from Firefox version 58, the name changed to Key4.db while the logins.json file name—which stores passwords in encrypted format—remain as it is.)

    You can use PasswordFox ( www.nirsoft.net/utils/passwordfox.html ) to display all usernames and passwords stored by Firefox. When executing this tool on the target machine, it will display the passwords for the current Firefox profile; if you want to view passwords of another profile, go to File menu ➤ Select Folders and select your target profile folder (see Figure 8-4).
    ../images/465906_1_En_8_Chapter/465906_1_En_8_Fig3_HTML.jpg
    Figure 8-3

    Firefox profile folder contents

    ../images/465906_1_En_8_Chapter/465906_1_En_8_Fig4_HTML.jpg
    Figure 8-4

    Select target Firefox profile folder using PasswordFox from Nirsoft

    Note! If the suspect was protecting his/her Firefox stored logins and passwords with a master password, then you need to supply it in order to view saved passwords (see Figure 8-4). Otherwise, the PasswordFox tool will reveal the remaining login information (such as username, web site, date created, etc.) only without displaying the associated passwords.

     
  5. 5.

    permissions.sqlite: Stores Firefox permission for individual web sites. For example, when you allow a specific web site to display pop-ups, Firefox saves this permission in this file. The same is true when installing an add-on from a particular web site.

     
  6. 6.

    search.json.mozlz4: Holds user-installed search engines.

     
  7. 7.

    prefs.js: Stores Firefox preferences.

     
  8. 8.

    addons.json: Views installed add-ons on Firefox.

     
  9. 9.

    extension-data [Folder] : Holds data generated by installed extensions (add-ons).

     

Google Chrome

This is the fastest and most used web browser on desktop computers worldwide today; most digital forensics examiners will likely come across this browser in one of their investigations.

Google Chrome is based on Chromium, which is an open source browser project developed by Google. The Chromium project has not seen the light as a standalone browser, so we can consider Google Chrome as the public version of this project. Many third-party web browsers are based on the Chromium project, like Vivaldi ( https://vivaldi.com ), Yandex browser ( https://browser.yandex.com ), Cent browser ( www.centbrowser.com ), and Opera browser ( www.opera.com ), to name a few.

Most web browsers that are based on the Chromium project are going to store data in a similar way; this fact allows examiners to use the same investigative techniques used with Google Chrome to investigate these browsers, making investigating Google Chrome act as a standard template for most Chromium-based web browsers.

Similar to other web browsers, Chrome (developed by Google Inc.) stores its configuration settings and user private information in SQLite databases; these databases are files without extensions, so do not get confused on how to open them when using SQLite browser. Just navigate to target the Google Chrome profile folder and make sure that the option “All files (*)” is selected as appears in Figure 8-5; then select the file you want to examine.
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig5_HTML.jpg
Figure 8-5

Open Google Chrome SQLite database files using DB Browser for SQLite

The Google Chrome profile is where Google Chrome stores its configuration settings, apps, bookmarks, and extensions. Google Chrome can have more than one profile; however, there is also a default profile that can be found at
Users<UserName>AppDataLocalGoogleChromeUser DataDefault

If there is more than one profile in Google Chrome, each profile will have its own folder where browser settings and user (profile owner) private data (e.g., passwords, browsing history, bookmarks, etc.) is stored. Google Chrome does not name any additional profile according to its username; instead, it uses a generic name (e.g., Profile 1, Profile 2, and so on). The location of additional Chrome profiles can be found here:

Users<UserName>AppDataLocalGoogleChromeUser DataProfile x(x could be any positive integer number beginning from 1).

To know the folder location of any Google Chrome profile (see Figure 8-6), just open a Chrome window that shows profile name/image in the top corner of the browser window, type the following in the browser address bar, and finally press the Enter button:
chrome://version
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig6_HTML.jpg
Figure 8-6

Location of current Google Chrome profile folder

Then check the “Profile Path” in the resulting window.

Now that we know how to access Google Chrome profile(s) folder, let us begin investigating the files contained within it.

Note!

We are using Google Chrome Version 69 (official build; 64 bit) and the default profile folder located at Users<UserName>AppDataLocalGoogleChromeUser DataDefault during our coming experiments.

History

Google Chrome store user browsing history, downloads, keywords, and search terms in the “History” database file are located under the Chrome user’s profile. This file can be examined using DB Browser for SQLite (see Figure 8-7). Note that there are 12 tables in this file and 11 indices.
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig7_HTML.jpg
Figure 8-7

Database schema of Google Chrome “History” file

To know when a particular file has been downloaded in addition to much information related to download history, go to the “Downloads” table under the “Browse Data” tab (see Figure 8-8). The DB Browser for SQLite displays time information using Google Chrome values stamps (also known as the Webkit format, which points to the number of microseconds passed since 00:00:00 UTC of Jan 1, 1601). To convert it into a readable form, use the DCode tool.
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig8_HTML.jpg
Figure 8-8

Reveal the start date/time of a particular download found in the “Downloads” table of the Google Chrome “History” file

Nirsoft offers a tool to reveal Chrome history; it is called ChromeHistoryView ( www.nirsoft.net/utils/chrome_history_view.html ). This tool reads the “History” file of the Google Chrome web browser.

Cookies

Google Chrome stores cookies information in the “Cookies” file located under the Chrome user’s profile; we can view “Cookies” file contents using DB Browser for SQLite, as we did with the “History” file before, to show detailed information about saved Chrome cookies (see Figure 8-9).
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig9_HTML.jpg
Figure 8-9

Viewing saved cookies information in the Google Chrome “Cookies” file using DB Browser for SQLite

Top Sites

This database file stores top web sites visited by Google Chrome. It holds two tables, meta and thumbnails, and the information is stored in the thumbnail table.

Shortcuts

This database is responsible for supporting the autocomplete feature of Google Chrome when typing (e.g., a search keyword in the address bar and in web forms). It contains two tables: meta and omni_box_shortcuts. The second table holds the autocomplete text and URLs.

Login Data

This database file holds three tables: login, meta, and stats. The “login” table holds usernames and passwords (sometimes encrypted), in addition to other related attributes, for various web sites.

A portable tool by Nirsoft can reveal all usernames and passwords (in clear text) stored by the Google Chrome Web browser. It’s called ChromePass (see Figure 8-10) and can be downloaded from www.nirsoft.net/utils/chromepass.html .
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig10_HTML.jpg
Figure 8-10

ChromePass by Nirsoft reveals all passwords stored by Google Chrome browser

Web Data

This function stores the login credentials of users (without passwords, as Chrome moved the login passwords to another file “Login Data” in newer Google Chrome versions), so when a user fills in a login form next time, searches keywords, and so on, Google Chrome will offer its autocomplete suggestions while typing.

Bookmarks

A browser bookmark (also known as a “favorite”) is a URL that points to a web site address stored by a user for later retrieval. The “Bookmarks database” file in Google Chrome holds a user’s current bookmarks. To view the contents of this file, we can open it using Windows Notepad. To check the date/time when a particular bookmark was added to Chrome, we need to convert the associated "date_added" value into a readable format; we can use the DCode tool as we did many times before (see Figure 8-11).
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig11_HTML.jpg
Figure 8-11

Analyzing Google Chrome “Bookmarks” database file using a free text editor, Geany ( www.geany.org )

Bookmarks.bak

This database file holds recent backups of the Chrome bookmarks; please note that this file will get overwritten periodically, each time Google Chrome launches. The forensic value of this file is that if a suspect deletes a particular bookmark(s) before closing his/her Chrome browser, we can find the deleted bookmark(s) here in this file (we should not launch Google Chrome till we have a copy of this file in a safe location to avoid overwriting it as we have already described).

Cache Folder

This folder holds frequently accessed static contents like images and parts of HTML files, so the next time a user visits the same web site, the browser loads it faster because it loads parts of contents from a local cache folder instead of downloading it again from the origin server housing the web site.

We can automate the extraction process of Google Chrome cache by using a tool from Nirsoft called ChromeCacheView ( www.nirsoft.net/utils/chrome_cache_view.html ). This tool reads the contents of the cache folder (see Figure 8-12) of the Google Chrome web browser, which is located in
Users<UserName>AppDataLocalGoogleChromeUser DatadefaultCache.
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig12_HTML.jpg
Figure 8-12

Using ChromeCacheView to view Google Chrome cache folder contents

As we saw, Google Chrome stores quite a lot of personal information about its user. Investigating all these artifacts can help examiners to draw a complete timeline of a user’s activities online in addition to understanding his/her intentions or interests by analyzing browsing history.

To conclude the last section of web browser forensics, we are going to give additional tools that can prove useful for digital examiners when investigating the three most widely used web browsers mentioned in this section.

Other Web Browser Investigation Tools

There are other general tools for investigating web browser artifacts, mainly from Nirsoft. Here is the list:
  1. 1.

    WebCacheImageInfo ( www.nirsoft.net/utils/web_cache_image_info.html ): Search and list all JPEG images with EXIF metadata information stored inside the cache folder of the following web browsers: IE, Firefox, and Google Chrome. As we have already discussed in Chapter 2, EXIF holds important information about JPG images like the camera model used to take the photo, and the date and time when that image was created.

     
  2. 2.
    ImageCacheViewer ( www.nirsoft.net/utils/image_cache_viewer.html ): Scan cache folder in any of the three major browsers (IE, Firefox, and Google Chrome) and list all images found inside (see Figure 8-13).
    ../images/465906_1_En_8_Chapter/465906_1_En_8_Fig13_HTML.jpg
    Figure 8-13

    Using the ImageCacheViewer tool to display all cached images stored in three major web browsers (IE, Firefox, and Chrome)

     
  3. 3.

    BrowserAddonsView ( www.nirsoft.net/utils/web_browser_addons_view.html ): Display all add-ons/extensions installed on all major web browsers (Chrome, Firefox, and IE). For Firefox and Chrome, if there is more than one profile for each browser, the tool can show add-ons for all profiles.

     
  4. 4.

    MyLastSearch ( www.nirsoft.net/utils/my_last_search.html ): Scan web history in all major browsers (Chrome, Firefox, and IE), cache folder, and retrieve all search queries made previously. This tool is important to know what a suspect was searching for at any date/time and what search engine he used to conduct this search.

     
  5. 5.

    WebBrowserPassView ( www.nirsoft.net/utils/web_browser_password.html ): A general password recovery tool that reveals passwords stored in IE (Version 4.0-11.0), Mozilla Firefox (all versions), Google Chrome, Safari, and Opera.

     
  6. 6.

    Web Historian ( www.webhistorian.org ): This is a great tool (browser extension for Google Chrome) to visualize web browsing history stored within Google Chrome; it shows graphical circles of the number of days a web site was visited (based on the time order of your web site visits) and keyword search terms, in addition to showing the most active browsing hours of a day and days of the week.

     

In this section, we shed light on how to perform a manual forensic analysis—in a variety of places and using a variety of utilities—of major web browser artifacts. Please keep in mind that commercial forensics suites have the ability to analyze and extract information contained in various web browsers automatically. As we always repeat, consult a computer forensic tool’s features list for the ability to investigate different web browsers’ data before buying it.

E-mail Forensics

E-mails have become the primary means of communications in today’s digital age; for instance, it is rare to see a person who owns a computer, smartphone, or tablet without having an active e-mail account. A study conducted by The Radicati Group2 estimated that there are 3.8 billion e-mail users (March 2018), and this number is estimated to exceed 4.1 billion in 2021. This is a huge number already and yet is continuing to increase steadily as more people around the world enter the digital era.

Basically, there are two standard methods to send/receive e-mails: the first one is using an application to send and receive e-mails (e.g., e-mail clients like Mozilla Thunderbird), and the second is using a web interface browser to access your e-mail account (e.g., Gmail, Yahoo, Outlook).

From a digital forensics viewpoint, we are concerned about finding and recovering e-mails from a suspect forensic image file/device, analyzing the e-mail header, extracting useful information from it like IP address and date/time when a particular e-mail was sent, and finally tracing e-mail back to its origin (the sender).

E-mail can be mainly abused through
  • Sending spam e-mails

  • Using it to commit a crime, e.g., e-mail harassment

  • Invading other user’s privacy by stealing their e-mail login credentials

Before we begin our discussion on how to track e-mails, let us give some important prerequisite information regarding how e-mail communications work.

Steps in E-mail Communications

To demonstrate how e-mail delivery works (see Figure 8-14), let us give this simple example:
  1. 1.

    Susan composes an e-mail ([email protected]) using her computer for Nihad ([email protected]); the message needs to be sent to her sending SMTP server (smtp.​apress.​org) using the SMTP protocol.

     
  2. 2.

    The sending server performs a lookup to find the mail exchange record of the receiving server (darknessgate.​com) through DNS protocol on DNS mx.​darknessgate.​com for the domain darknessgate.​com.

     
  3. 3.

    The DNS server responds and gives the mail exchange server mx.​darknessgate.​com for the domain darknessgate.​com.

     
  4. 4.

    Now, the sending server will establish an SMTP connection with the receiving server and send the e-mail to Nihad’s mailbox on the receiving server.

     
  5. 5.

    The receiving server will receive the incoming e-mail and store it in Nihad’s mailbox.

     
  6. 6.

    Nihad can either download the e-mail message from his mailbox on the receiving sever into his e-mail client (e.g., Mozilla Thunderbird) on local machine using POP3 or IMAP protocols or he can use webmail (through a web browser) to read the e-mail directly on the receiving server.

     
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig14_HTML.jpg
Figure 8-14

How e-mail communication works. Source: www.darknessgate.com

List of E-mail Protocols

In the previous section, we’ve mentioned many names of e-mail protocols that facilitate e-mail delivery. Table 8-1 lists the main protocols used in e-mail communication and the role of each one.
Table 8-1

Common E-mail Protocols

Protocol Name

Role

SMTP

Simple Mail Transfer Protocol: Used to transfer e-mail messages from client to server and between servers.

POP3

Post Office Protocol: Clients use it to download their incoming e-mail from their e-mailbox to their local machine (using a proper e-mail client like MS Outlook or Thunderbird) without saving a copy on the POP3 server.

IMAP

Internet Message Access Protocol: This is another incoming mail protocol (like POP3) and plays the same role; however, it differs from the POP3 protocol in allowing a user to store a copy of his/her incoming e-mail message on the mail server even after a user downloads it to his/her local machine.

HTTP

HyperText Transfer Protocol: When a user sends and receive e-mails using the webmail interface (Web browser), like Google and Yahoo!, the HTTP protocol will be used.

E-mail Header Examination

When examining e-mails for forensic information, (e.g., to see where the e-mail come from), the needed information is already stored within it, specifically in the e-mail header section. An E-mail header stores a wealth of forensically useful information about an e-mail under investigation, like the path it took over the Internet to arrive, stop points/delays made during e-mail delivery, and the IP address of the machine that sent this e-mail, in addition to the client (e.g., e-mail program) who sent this e-mail and the type of OS used (in some cases).

Please note that most of the information (including the technical information) in the e-mail header can be forged! Tech-savvy criminals can conceal the origin of their e-mails and even make it similar to an original e-mail that they are trying to reproduce (e.g., phishing e-mails); however, the role of a forensic examiner is to gather the information in the e-mail header and examine it thoroughly, as it can lead to something useful for solving the case at hand.

Reveal Full E-mail Header Information

Before we begin examining the e-mail header, let us give some examples of how to view e-mail headers using popular webmail services (Gmail and Microsoft Outlook mail) and e-mail clients (Thunderbird and MS Outlook).

View Full Gmail Headers
To display Gmail headers, follow these steps:
  1. 1.

    Access the target Gmail account using your preferred browser

     
  2. 2.

    Open the e-mail whose header you want to view

     
  3. 3.
    Next to Reply, click the down arrow (see Figure 8-15)
    ../images/465906_1_En_8_Chapter/465906_1_En_8_Fig15_HTML.jpg
    Figure 8-15

    Show Gmail e-mail message header

     
  4. 4.

    Click “Show original”

     
View E-mail Header Using Outlook Mail
To display Outlook web mail header , follow these steps:
  1. 1.

    Access Outlook mail account using your preferred browser

     
  2. 2.

    Open the e-mail whose header you want to view

     
  3. 3.

    Next to Reply, click the down arrow in the top right-hand corner of the e-mail

     
  4. 4.

    Click “View message source” (see Figure 8-16)

     
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig16_HTML.jpg
Figure 8-16

View message source using Outlook Mail

View Full E-mail Headers in Mozilla Thunderbird
To display e-mail headers using the Mozilla Thunderbird e-mail client , follow these steps:
  1. 1.

    Open Thunderbird, then open the message whose header you want to investigate in a new window by double-clicking over it.

     
  2. 2.

    Got to View ➤ Headers ➤ All.

     
  3. 3.

    Another option to view the header is to open the message in a new window, and then go to the “More” button on the top right message window and select “View Source” (see Figure 8-17).

     
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig17_HTML.jpg
Figure 8-17

View e-mail header using Mozilla Thunderbird e-mail client

View Full E-mail Header in Outlook Mail Client
To display a full e-mail header using Microsoft Outlook mail client , follow these steps:
  1. 1.

    Open MS Outlook and go to the e-mail whose header information you want to view. Double-click this e-mail to open it in a new window.

     
  2. 2.

    Click File ➤ Properties; the header info is located in the “Internet headers” box (see Figure 8-18).

     
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig18_HTML.jpg
Figure 8-18

Viewing e-mail header info using MS Outlook e-mail client

Analyzing E-mail Headers

Now that we know how to reveal an e-mail header, we can begin analyzing it. Keep in mind that the preferred method to read an e-mail header is from bottom to top. Figure 8-19 is a sample e-mail header from a message received using Gmail service.
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig19_HTML.jpg
Figure 8-19

Sample e-mail header; always read it from bottom to top

In Figure 8-19, The number [1] points to Message-ID; this is a unique number assigned by the sending e-mail server. The number [2] points to the e-mail address of the sender (this can also be false, as anyone can adjust the sender’s “e-mail address” from his/her end). Number [3] points to the originating IP address (IP address of the sender); keep in mind that this IP address can be forged or spoofed. Expect to see more than one “Received” line. However, always read the e-mail header from bottom to top; this makes the first “Received” line highly probably point to the sender itself. Number [4] is the recipient IP address. Number [5] is the e-mail address of the recipient.

Lines starting with “X” in the e-mail header are comments written by the sending software (e.g., e-mail clients), by the SMTP servers, and even by the antivirus/spam servers found along the path the e-mail traveled.

E-mail Headers

When an e-mail travels through the Internet, each mail server the e-mail passes through will add a piece of information to the header, so the preceding e-mail header screen capture can contain more information like e-mail client and OS used to send the message. See Figure 8-20 for a partial e-mail header sent from Mozilla Thunderbird e-mail client using a Windows 10 machine.
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig20_HTML.jpg
Figure 8-20

An e-mail header can reveal additional information about the message like an e-mail client’s name and version and the OS used to compose and send the message

Analyzing e-mail headers manually can be a daunting task for beginners, but many tools and online services are available to extract useful information from e-mail headers automatically. Let us begin with a simple online tool developed by Google named “Message header” ( https://toolbox.googleapps.com/apps/messageheader ).

To use this tool:
  1. 1.

    Copy the target e-mail header as we did previously.

     
  2. 2.

    Paste the contents into the box “Paste email header here”.

     
  3. 3.

    Finally, click “Analyze the header above”.

     
The tool will analyze the supplied message header and show (in addition to who sent the message) the names of all attachments and the path the message took to reach from sender to receiver (see Figure 8-21) in addition to any delay that may have happened during delivery.
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig21_HTML.jpg
Figure 8-21

Message route from sender to receiver revealed by the Message header online tool ( https://toolbox.googleapps.com/apps/messageheader/ )

There are various tools to analyze e-mail headers. The following are some popular one:

E-mail Header Analyzer ( https://mxtoolbox.com/EmailHeaders.aspx )

This is an online tool for parsing e-mail headers, making them human readable. To use this tool, just go to the web site and paste the target e-mail header info. The result will show—among other info—the path this e-mail took over the Internet in addition to any delays that may have happened.

eMailTrackerPro ( www.emailtrackerpro.com )
This is a commercial tool (it offers a 15-day fully functional trial version) for tracking e-mails using e-mail headers. To use this tool to track a particular e-mail header, do the following:
  1. 1.

    Go to the tool web site, and download and install the tool as you do with any Windows app.

     
  2. 2.
    Launch the program and click the “Trace Headers” button in the main tool window (see Figure 8-22).
    ../images/465906_1_En_8_Chapter/465906_1_En_8_Fig22_HTML.jpg
    Figure 8-22

    Using eMailTrackerPro to track e-mail headers

     
  3. 3.

    A new window appears, in which you can paste the target e-mail header and press the “Trace” button to begin tracing.

     
  4. 4.

    When tracing finish, click the “My Trace Reports” button in the main program window to show a detailed tracing report (see Figure 8-23).

     
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig23_HTML.jpg
Figure 8-23

Report generated by eMailTrackerPro for tracing an e-mail address using its header

From Figure 8-23 we note the following:
  1. 1.

    Sender originating IP address: keep in mind that this address can be internal (private IP address) or simply a fake/spoofed IP address.

     
  2. 2.

    Information about the network responsible for sending this e-mail.

     
  3. 3.

    Sender e-mail address.

     
  4. 4.

    Internet route that the target e-mail follows to reach its final destination .

     
Determining a Sender’s Geographic Location
As we have seen, the sender’s IP address can be extracted from the e-mail header (go to the line that begins with “Received: from” beginning from the bottom header); then we can use this IP address to determine the geographical location of the sender. There are already many online services that can be used to map IP addresses to geographical locations like Wolfram Alpha ( www.wolframalpha.com ) or Ipfingerprints ( www.ipfingerprints.com ) (see Figure 8-24).
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig24_HTML.jpg
Figure 8-24

Mapping IP address to geographical location using www.ipfingerprints.com

To find more information about any IP address or domain name, check these free services:
  1. 1.

    IPverse ( http://ipverse.net ): This shows the IPv4 and IPv6 address block lists by country code.

     
  2. 2.

    IP2Location ( www.ip2location.com/demo.aspx ): This is a free IP location service.

     
  3. 3.

    DB-IP ( https://db-ip.com ): This shows the IP geolocation and network intelligence.

     
  4. 4.

    IPINTEL ( https://ipintel.io ): This shows the IP address on a map and shows the ISP.

     
  5. 5.

    IP Location ( www.iplocation.net ): This shows IP geolocation data.

     
  6. 6.

    UTrace ( http://en.utrace.de ): Locate IP address and domain names.

     
  7. 7.

    Onyphe ( www.onyphe.io ): This is a search engine for open source and cyberthreat intelligence data. You can use it to find more info about any IP address.

     
  8. 8.

    IP to ASN ( https://iptoasn.com ): This shows the IP address to the ASN database; updated hourly.

     
  9. 9.

    Reverse DNS Lookup ( https://hackertarget.com/reverse-dns-lookup ): This shows reverse DNS entries for a target IP address.

     
  10. 10.

    Reverse IP lookup ( https://dnslytics.com/reverse-ip ): Find domains sharing the same IP address or subnet.

     
  11. 11.

    Same IP ( www.sameip.org ): This shows sites hosted on the same IP address.

     
  12. 12.

    IP Address Tools ( www.ipvoid.com ): Offers various IP address online tools.

     
  13. 13.

    ExoneraTor ( https://exonerator.torproject.org ): Here you can check whether a particular IP address was used as a Tor relay before.

     
Determine Sender Geographic Location Using Sender’s Time Zone
In some cases, the sender IP address can be missed or not included in the message header. This is true when the sender uses a webmail service like Gmail to send e-mails. In this case, we can determine the sender’s location by checking the sender’s computer time zone information. To learn this piece of information, we can use https://toolbox.googleapps.com/apps/messageheader/ (already used) and check the “Created at:” field (see Figure 8-25).
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig25_HTML.jpg
Figure 8-25

Revealing sender local time zone

Investigating E-mail Clients

Many users rely on e-mail clients to send/receive e-mails; for instance, the most two popular e-mail programs are MS Outlook and Mozilla Thunderbird.

Autopsy has a default ingest module to investigate e-mail messages (Thunderbird and Outlook e-mail clients) found within the supplied data source (e.g., forensic image or e-mail client folder when performing analysis of logical files).

Thunderbird is a free, open source e-mail client by Mozilla; it stores its e-mails and attachments using the MBOX extension. Thunderbird files can be found at
Users<UserName>AppDataRoamingThunderbirdProfiles.
The following steps will guide you on how to use Autopsy for investigating e-mail messages stored by the Thunderbird e-mail client :
  1. 1.

    We already covered how to create a new case using Autopsy; in this experiment, we will create a case as we did previously. However, we will change the data source to include only the Thunderbird profile folder instead of a whole hard drive image as we did previously.

     
  2. 2.
    We will not demonstrate all steps of creating a new case from the beginning, so begin the wizard, and when you reach the “Add Data Source” window, select “Logical Files” (see Figure 8-26) and then click “Next” to continue.
    ../images/465906_1_En_8_Chapter/465906_1_En_8_Fig26_HTML.jpg
    Figure 8-26

    Select “Logical Files” as a data source

     
  3. 3.
    Now, click the “Add” button to select the Thunderbird profile folder; make sure the option “Local files and folders” is selected (see Figure 8-27). Click “Next” to continue.
    ../images/465906_1_En_8_Chapter/465906_1_En_8_Fig27_HTML.jpg
    Figure 8-27

    Select Thunderbird profile folder as a data source

     
  4. 4.
    Now, you need to configure the ingest modules; for instance, we are concerned with e-mail forensics only, so we will select two ingest modules only: Email Parse and Keyword Search (see Figure 8-28). Click “Next” to continue.
    ../images/465906_1_En_8_Chapter/465906_1_En_8_Fig28_HTML.jpg
    Figure 8-28

    Configure ingest modules window; select only two modules to parse e-mails and search within returned results

     
  5. 5.

    The final window in the wizard appears, announcing that the data source has been added successfully. Click “Finish” to continue.

     
Now, Autopsy will begin analyzing files; this takes some time to finish. When Autopsy finishes processing the supplied data source, we can see collected e-mail messages in the “Data Explorer” pane on the left side of the window under the “Email messages” section (see Figure 8-29).
../images/465906_1_En_8_Chapter/465906_1_En_8_Fig29_HTML.jpg
Figure 8-29

The results of parsing the Thunderbird profile folder

Webmail Forensics

Sometimes, we may need to investigate a case where e-mails are stored in the cloud (e.g., Gmail, Yahoo!, Outlook Mail). The first step needed to conduct such an examination is to acquire the data (hence, e-mail messages) from the cloud for analysis. The following options are available:
  1. 1.

    Most webmail providers give their users POP3/IMAP access to their stored e-mail. We can use an e-mail client like Thunderbird to synchronize a target e-mail account for offline analysis—of course, we need to have access to this account first.

     
  2. 2.

    If the suspect e-mail is in Gmail (Google e-mail service), we can use a tool offered by Google called “Google takeout” to create/download an offline backup of all Google application data that belongs to the target Google user account. To use this tool, just go to https://takeout.google.com/settings/takeout (you need to be signed in first to the Google account that you want to acquire) and then select which Google products you want to include in your archive. After that, click “Next” to move to the next window where you can customize the archive format. Finally, click “Create Achieve” and wait Google to send you a link to the target user Gmail account to download the archive for offline usage.

     

E-mail Investigations Challenge

Investigating e-mails and knowing the source/origin of it are not always straightforward tasks; the following challenges and limitations can frustrate examiners when dealing with cases that involve e-mail investigations.
  1. 1.

    Disposable e-mail addresses: It is extremely difficult and even impossible in many cases to track disposable (temporary) e-mail addresses. This kind of e-mail lives for a short time and is usually used for one time (or one contact) only.

     
  2. 2.

    Anonymous e-mails: For example, using the TOR network to send anonymous e-mail messages. Tracking such e-mails is nearly impossible, since they follow strict precautionary steps.

     
  3. 3.

    Shared e-mail accounts : Here, a suspect creates an e-mail account using a free service like Yahoo! or Gmail, then shares the access to this account with his/her partner. The parties do not exchange e-mails: a suspect has just to write an e-mail (e.g., instructions for criminal activity) and then leave it in the draft folder. His/her partner will access this account, read the instructions, and then delete the draft message.

     
  4. 4.

    Different jurisdictions: We have already covered this in Chapter 1; cloud e-mail providers may store your e-mails in servers located in countries other than the one in which you currently reside. For example, consider a suspect involved in a criminal activity in the United States who has an e-mail account with an e-mail provider in Switzerland; can law enforcement in the United States force the Swiss provider to release suspect data?

     

Chapter Summary

In this chapter, we have thoroughly covered how to investigate the most used web browsers—Google Chrome, Firefox, and IE/Edge—for forensic artifacts. The dependence in this chapter was on manual analysis, in addition to using some simple, free tools that can aid investigators in their forensics work.

Currently, most cybercrimes involve using the Internet in one way or another to commit or facilitate a criminal activity. This leaves digital traces on both the client machine (e.g., browsing history, previous searches, download history, and login credentials to social media accounts) and the web server such as communication logs (e.g., IP address and timestamp information).

In the next chapter, we will reverse the situation and show you how criminals can use various techniques to frustrate computer forensic examiners’ efforts and prevent them from doing their jobs in capturing and analyzing digital evidence.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.15.1