infosecwriteups.com Open in urlscan Pro
162.159.152.4  Public Scan

Submitted URL: https://infosecwriteups.com/email-analysis-avoid-phishing-attacks-360a81e1ebf8
Effective URL: https://infosecwriteups.com/email-analysis-avoid-phishing-attacks-360a81e1ebf8?gi=48c738d3d59f
Submission: On December 14 via manual from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

Open in app

Sign up

Sign In

Write


Sign up

Sign In


Published in

InfoSec Write-ups

Fallen sky
Follow

Dec 8

·
4 min read
·

Listen



Save







EMAIL ANALYSIS : AVOID PHISHING ATTACKS


THM ADVENT OF CYBER- DAY6 WRAPPED 👽

In this article , we’ll see how to analyze emails and look at various parts an
email consists of.

email analysis is the process of extracting email header information to expose
the email file details. The email header is the protagonist here and provides
enough info to decide to filter/quarantine/deliver the particular email message.

There are two main concepts in email analysis:

 1. Security issues : suspicious/abnormal/malicious patterns in emails.
 2. Performance issues : delivery and delay issues.

we’ll be focusing on security issues in this article.

Phishing and social engineering help malicious users to inject bad code on the
victim’s machine or withdraw personal information/credentials from the victim.

In spite of having various tools and technologies, most of the companies prefer
manual analysis when there is no budget for automated solutions, also an
in-depth analysis of emails requires an isolated environment.

Let’s understand the structure of an email header :

 1.  From : sender’s address
 2.  To : receiver’s address (including CC and BCC)
 3.  Date: Timestamp, when email was sent
 4.  Subject
 5.  Return path : reply-To
 6.  Domain key and DKIM signatures
 7.  SPF : Server that was used to send the email. compare servers with actual
     domain.
 8.  Message-ID : Unique ID of the email
 9.  MIME-Version : “non-text” contents and attachments
 10. X-Headers
 11. X-received : mail servers that the mail went through
 12. X-span status : spam score of email
 13. X-mailer : email client name

A simple analysis must contain the answer to the following questions :-

q- Do the “From”, “To”, and “CC” fields contain valid addresses? invalid
addresses is a red flag.

q-Do the “From” and “To” fields are the same? red flag if same.

q-Do the “From” and “Return-Path” fields are the same? Different values is a red
flag

q-Was the email sent from the correct(official) server?

q-Does the “Message-ID” field exist, and is it valid? empty and malformed values
are red flags.

q-Do the hyperlinks redirect to suspicious/abnormal sites? Suspicious links and
redirections are red flags.

q-Do the attachments consist of or contain malware? use sandboxes.

Now, What’s sandboxes? A sandbox is an isolated testing environment that enables
users to run programs or open files without affecting the application, system or
platform on which they run. Software developers use sandboxes to test new
programming code.

cool. Then we’ll need an email header parser tool or configure a text editor to
highlight and spot email header’s details.

You can also do this on gmail. Just open the email you want to analyze and then
click on show original:


Download this as .eml and then use text editor.

Let’s do this in VS CODE. Get the extension from the link below:


SMTP HEADERS - VISUAL STUDIO MARKETPLACE


EXTENSION FOR VISUAL STUDIO CODE - HIGHLIGHTING FOR SMTP HEADERS.

marketplace.visualstudio.com



and then open the .eml file in VSCODE. You can then see all possible fields in
the header section of the email.

Now let’s take a look at some tools to have a clear view of what’s happening
here.

emlAnalyzer is one such tool. The emlAnalyzer is a tool designed to parse email
headers for a better view and analysis process.

You may get it from here : https://github.com/wahlflo/eml_analyzer.



Apart from this one can use some OSINT tools to check email reputation.

VISIT SITE : https://emailrep.io/ for the same.

Email analyst toolbox :

 1. VirusTotal : cloud based sandbox environment.
 2. InQuest : network and file analysis
 3. IPinfo.io
 4. Talos Reputation
 5. Urlscan.io
 6. Browserling : browser sandbox
 7. Wannabrowser : browser sandbox

For file based reputation check, one should compute the value of the file using
sha256sum tool to calculate file’s hash value.



> Hash based file reputation analysis : go to
> https://www.virustotal.com/gui/home/upload

click on the search icon and paste the hash value and then analyze the details.

After that continue reputation checks on InQuest.

> https://labs.inquest.net/

Now visit the tool website and use the INDICATOR LOOKUP option to conduct
hash-based analysis.


imgsrc: https://tryhackme.com/room/adventofcyber4

This completes the basic email analysis procedure. All you have to do now is
create a report of findings and inform your manager about what’s wrong.




FROM INFOSEC WRITEUPS: A LOT IS COMING UP IN THE INFOSEC EVERY DAY THAT IT’S
HARD TO KEEP UP WITH. JOIN OUR WEEKLY NEWSLETTER TO GET ALL THE LATEST INFOSEC
TRENDS IN THE FORM OF 5 ARTICLES, 4 THREADS, 3 VIDEOS, 2 GITHUB REPOS AND TOOLS,
AND 1 JOB ALERT FOR FREE!




1





1

1





SIGN UP FOR INFOSEC WRITEUPS


BY INFOSEC WRITE-UPS

Newsletter from Infosec Writeups Take a look.

By signing up, you will create a Medium account if you don’t already have one.
Review our Privacy Policy for more information about our privacy practices.

Get this newsletter


MORE FROM INFOSEC WRITE-UPS

Follow

A collection of write-ups from the best hackers in the world on topics ranging
from bug bounties and CTFs to vulnhub machines, hardware challenges and real
life encounters. Register for the much-awaited virtual cybersecurity conference
#IWCON2022: https://iwcon.live/.

LeoX

·6 days ago


HACKING INTO WI-FI CAMERA TP-LINK TAPO C200 (CVE-2021–4045)

One day during the regular daily reading of vulnerability databases and I came
across of one interesting vulnerability (CVE-2021–4045) for Wi-Fi camera which I
own. I bought this camera long time ago for monitoring of my baby while
sleeping. This camera was laying in a closet for a long time…

Hacking

3 min read



Hacking

3 min read




--------------------------------------------------------------------------------

Share your ideas with millions of readers.

Write on Medium

--------------------------------------------------------------------------------

Stefan P. Bargan

·6 days ago

Member-only


TRYHACKME ADVENT OF CYBER 2022 [DAY 7] MALDOCS ROASTING ON AN OPEN FIRE— NO
ANSWERS :P

Day 7 Learning Objectives: What is CyberChef What are the capabilities of
CyberChef How to leverage CyberChef to analyze a malicious document How to
deobfuscate, filter and parse the data Day 7 Question 1: We first need to launch
the AttackBox to find that out. “An offline version of CyberChef is bookmarked…

Tryhackme

3 min read



Tryhackme

3 min read




--------------------------------------------------------------------------------

Karthikeyan Nagaraj

·6 days ago


ADVENT OF CYBER 2022 [DAY 7]-CYBER CHEF MALDOCS ROASTING ON AN OPEN FIRE WRITEUP
BY KARTHIKEYAN NAGARAJ

Advent of Cyber 4 2022 [Day 7] Cyber Chef Maldocs roasting on an open fire —
task 12 Answers — Let’s Transfer the Files from TryHackMe Machine to Our Machine
for Better Investigation!!

Advent Of Cyber 2022

3 min read



Advent Of Cyber 2022

3 min read




--------------------------------------------------------------------------------

Bhavesh Harmalkar

·Dec 7


TRYHACKME CMESS CTF

Can you root this Gila CMS box? — Room found here :
https://tryhackme.com/room/cmess In this machine, we have two flags stored in
the user.txt and root.txt file. Start Your Machine ………

Tryhackme

6 min read



Tryhackme

6 min read




--------------------------------------------------------------------------------

Stefan P. Bargan

·Dec 6

Member-only


TRYHACKME ADVENT OF CYBER 2022 [DAY 6] IT’S BEGINNING TO LOOK A LOT LIKE
PHISHING — NO ANSWERS :P

Day 6 Learning Objectives: Learn what email analysis is and why it still
matters. Learn the email header sections. Learn the essential questions to ask
in email analysis. Learn how to use email header sections to evaluate an email.
Learn to use additional tools to discover email attachments and conduct…

Tryhackme

4 min read



Tryhackme

4 min read




--------------------------------------------------------------------------------

Read more from InfoSec Write-ups


RECOMMENDED FROM MEDIUM

Multiplier

UNICRYPT LIQUIDITY LOCKED



Arly Utley

{UPDATE} GROW THE KINGDOM HACK FREE RESOURCES GENERATOR



Paul Schmitzer

in

Particl News

GUIDE: HOW TO GENERATE YOUR PARTICL WALLET



Sajjad Arshad

UNDERSTANDING AND MITIGATING THE SECURITY RISKS OF CONTENT INCLUSION IN WEB
BROWSERS



GoShards

UNDERSTANDING NFTS: NFTS CHANGE THE CRYPTO MODEL BY MAKING EACH TOKEN
ONE-OF-A-KIND AND…



Claudio Proietti

PRIVNOTE’S EVIL TWIN



Surya Dev Singh

BOUNTY HACKER [TRYHACKME]



Trulioo

in

The RegTech Hub

CORPORATE TRANSPARENCY ACT — A NEW ERA IN U.S. BENEFICIAL OWNERSHIP DISCLOSURE



AboutHelpTermsPrivacy

--------------------------------------------------------------------------------


GET THE MEDIUM APP




FALLEN SKY

8 Followers

Student | Full stack web developer and designer | Tech Enthusiast | Python
developer | prioritizing cyber security .

Follow



MORE FROM MEDIUM

Graham Zemel

in

The Gray Area

THE TOP 8 CYBERSECURITY RESOURCES FOR PROFESSIONALS IN 2022



Graham Zemel

in

The Gray Area

BUG BOUNTY HUNTING 101 — REMOTE CODE EXECUTION (RCE)



Pentester Academy

in

Pentester Academy Blog

LAB WALKTHROUGH — EXPLOITING SPRING4SHELL (CVE-2022–22965)



Graham Zemel

in

The Gray Area

THE TOP 8 BUG HUNTING TOOLS FOR P1 BUG BOUNTIES



Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech