500.4 - Email, Key Additional Artifacts, and Event Logs Flashcards
(41 cards)
E-mail Forensics Overview
- Who, When, Where, Relevant
- Host-based, servers, Cloud, Mobile
- What can we Analyze?
- Mail Header, Message Body, Attachment
E-mail Headers
- Message-ID - Unique Fingerprint
- Received - Who sent the email - Start @ bottom - In reverse order
- X-Originating-IP - Client IP Address (Public = Off)
- X-Mailer - What client program generated the email
Email Authenticity
- Valid SPF & DKIM increases trust
- Sender Policy Framework (SPF) - Validate sending IP Address to Orig. Domain
- DomainKeys Identified Mail (DKIM) - Verifies that message content has not changed via Dig. Signal
Message-ID Threading (References and In-Reply-To)
- Message - IDs can be used to identify related emails (thread) via Refs & In-Reply to
Extended MAPI Headers
- Tracks Add’tl timestamps, unique IDs, Last Action)
- Messaging Architecture - Core component of Exchange & Outlook
Host-Based E-mail
- On Local Machine, Identify email locations, deleted email archives
Microsoft Outlook - File Ext: (.PST)
- Email Archive stored by default,
- Encrypted/Obfuscation by default
- Up to 5GB saved
Location
- “User”\AppData\Local\Microsoft\Outlook (2010 & earlier)
- “User”\Documents\Outlook (2013/2016)
- HKCU\Software\Microsoft\WindowsNT\CurrentVersion\WindowsMessagingSubSystem\Profiles\Outlook
Offline Folder Files (.OST)
- Cached Exchange Mode (Offline mail access)
- Syncs with Server
- Locally Stored, 50 GB
Location
- C:\Documents&Settings"User”\Local Settings\Application Data\Microsoft\Outlook
Outlook Attachment Recovery
- Uses a “Secure Temp Folder” to open attachments
- Located under Internet Explorer cache folders - Temporary Internet Files (-Win10) and INetCache (+IE11)
- Previewed and Opened attachs. Can be recovered
- Prior to 2007, attachments persisted until Disk Cleanup
- After 2007 attachments remain only if message/outlook is closed before the attachment
Location
- AppData\Local\Microsoft\Windows\Temporary Internet Files\ Content.Outlook
- AppData\Local\Microsoft\Windows\INetCache\Content.outlook (IE11+)
- HKCU\Software\Microsoft\Office"Version”\Outlook\Security\OutlookSecureTempFolder
E-mail Encryption
- Individual message encryption is most common
- Uses public-key protocol like Secure MIME (S/MIME) or PGP/ MIME (.pgp, .p7m file extensions)
- Not decrypted en route
- Encrypted messages will show …
- – Begin PGP Message —
- – End PGP Message —
Microsoft Exchange (.edb, ese, .stm)
- Is a database for Users Mailbox,
- (2007 +) in .EDB format
- Extensible Storage Engine (ESE) format & previously .EDB & .STM files composed database
- .EDB stores mail, attachments, contacts, Journal, notes, tasks, calendar, & address book entries
- .log files contain messages not yet written to .EDB
- Can be exported in .PST file format
Location
- C:\ProgramFiles\Microsoft\ExchangeServer\Mailbob\FirstStorageGroup\MailboxDatabase.edb
“Recoverable Items” in Exchange
- Deletions - Items removed from users Deleted Items Folder; Deleted mail from POP or IMAP accounts
- Purges - Temp location for hard-deleted items from Deletions folder & items that exceed retention period
- Discovery Hold - Deleted items from mailboxes placed hold
- Versions - Copy-on-write changes to items in active mailboxes placed on hold
- Audits - Audit log entries for mailboxes with auditing enabled
- Calendar Logging - Calendar changes when calendar logging is enabled
- Message Tracing - log showing message defaults of sent & received mail
- Email retained for 14 days, & mailboxes for 30days
- 2010 includes indexing & retention for ALL deleted objects
- Maintains versions of emails
- Can freeze logs to prevent deletion
- Unread emails still in “transit”
Online Acquisition Windows Server Backup
- Used with Win 2008 + / Exchange 2007 +
- Uses Volume shadow copies
- ensures database consistency
- can not backup and restore individual mailboxes
- Exchange databases must be stored together
- Backups stored as VHD files
Unified Audit Logs in O365
- Search & Export logs
- Exchange Online, Sharepoint Online, OneDrive for Buisness, Azure AD
- Not enabled by default
- has to be turned on for EACH user - 90 day retention
- No default logging for owners, viewed messages only for Admin users, No logg off events, IP & client included
Webmail Forensics
- Emails normally stored on ISP servers
- Possible exception for POP or IMAP
- User IP address & subscriber info may be available for ISP
- Look for webmail addresses
- Cached copies can be recovered
- Can perform keyword searching & carving of webmail fragments
- Protected storage & auto complete functions
Compressed Webmail Remnants
- Webmail is often compressed
- Cache may not be in HTML format
- File signature analysis might be required to identify compressed zip files
Mobile E-mail
- Mobile devices receive email from a webmail or corporate server
- Mail often stored in both locations
- Consider Mobile Device Management (MDM)
- Phone, SMS/MMS, BBM, & PIN metadata logs
- MDM, like BlackBerry UEM & Global Relay, may archive content (Android/Blackberry only)
- Look for local backup copies
- .PST, Blackberry .BBB/.IPD, and Android .ab files
- iOS “Apple Computer” folder or search for manifest.plist
Windows Search Database (.edb)
- Collects - Files, emails, Content related items
Location
- C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windos.edb (Win7+) - C:\Document&Settings\AllUsers\AppsData\Microsoft\SearcData\Apps\Windows\Windows.edb (XP)
ESE NT Utlities - Windows.edb
- esentutl tool is uses for defragmentation, recovery, interegty checking, data dumping, and repair for ESE databases
Thumbnail Forensics - thumbs.db (2)
- Hidden file in directory where images on machine exits stored in smaller thumbnail graphics
- thumbs.db catalogs pictures in a folder & stores a copy of the thumbnail even if the pictures were deleted
- WinXP - Automatically created anywhere
- Win7/8/10 - Automatically created anywhere accesses via a UNC path (local to remote)
- GoPro - Displays on camera screen
- Includes thumbnail of pic/doc, Last Mod (XP), Original filename (XP)
Location
- C:\Users"user”\Documents (Win7)
-
Win7/Win8/Win10 Thumbcache
- Thumnails only (S-32,M-96,L-256, XL - 1024),
- Location MIGHT be stored, Date/Time not stored
Location
- C:\Users"user”\AppData\Local\Microsoft\Windows\Explorer
Mapping Filenames to Thumbcache
- Windows.edb & Thumbcache
- CANNOT be dirty, must be recovered
Recycle Bin Forensics
- Hidden Systems Folder
- Subfolder is created with users SID
- Contains recovery files
- “Recycler” 2000/NT/XP/2003 - before Vista
- Hidden file in a directory called “INFO2”
- INFO2 contains deleted time & original filename
- INFO2 maps the recycle bin filename to the time & date that the file was deleted as well as the true filename of the file (Full path name, time, & date)
- Filename in both ASCII & UNICODE
- “$Recycle.bin” Vista+
- Deleted time & original filename contained in separate files for each deleted recovery file
Win7/Win8/Win10 Recycle Bin
- Under $Recycle.bin & SID
- Files Proceded by $I###### & contain Orig. path & name, and recycled/deleted data & time
- Files Proceded by $R###### contains the actual file recovery data or original file that has been moved into the recycle bin