Week 11 Email Analysis: Lab1
Learning Objectives
By the end of this lab, you should be able to:
- Demonstrate practical competence in using forensic tools and techniques to acquire, preserve and document digital evidence.
- Analyse and interpret email headers to identify indicators of phishing, spoofing and other malicious activity.
- Correlate header information with external lookup and geolocation tools to build an evidence-based assessment.
Overview
Email headers contain detailed technical information about the origin, routing and authenticity of an email message.
During this lab, you will investigate a real email you received, extract its header, and examine it both manually and using online forensic tools.
You may complete the work individually or in small groups.
Part 1 - Research Task
1. Anatomy of an Email Header
Research the structure of an email header and write a short summary covering:
- What an email header is
- How it differs from the body of an email
Then list the most common header fields that are useful in phishing investigations, such as:
From:Return-Path:Received:(all entries)Message-ID:Reply-To:DKIM-SignatureSPFandDMARCresultsContent-TypeUser-Agent
Provide a brief explanation of why each field matters during forensic analysis.
Part 2 - Acquire the Email Header
2. Select an Email
Choose a recent email you received (preferably a suspicious or promotional one).
3. Extract the Email Header
Use your email provider to copy the full header.
Examples:
- Gmail: More → Show original
- Outlook: File → Properties → Internet Headers
- Apple Mail: View → Message → All Headers
Paste the full header into your lab document.
Part 3 - Manual Header Analysis
4. Analyse the Header Manually
Manually inspect key fields and answer:
- Who does the email claim to be from?
- What is the actual sending server domain/IP?
- Do the
Received:lines show unexpected hops? - Is the
Return-Pathconsistent with the sender? - Does the
Message-IDbelong to the correct domain? - Are SPF, DKIM or DMARC checks failing?
- Does the timestamp order look valid?
Highlight any suspicious entries.
Part 4 - Tools-Based Header Analysis
5. Analyse the Header Using MXToolbox
Use the tool:
https://mxtoolbox.com/EmailHeaders.aspx
Tasks:
- Paste your header into the analyser
- Record the number of hops
- Note routing anomalies
- Compare MXToolbox results with your manual findings
Part 5 - IP Address Investigation
6. Investigate the IP Address
Identify the originating IP from the top-most Received: line.
Use a geolocation tool:
- https://www.ip2location.com
Tasks:
- Determine the geographical location of the IP
- Identify the ISP or hosting provider
- Assess whether this location aligns with the claimed sender
Part 6 - Forensic Tools Research
7. Search for Email Header Analysis / Forensic Tools
Find and list as many tools as possible, including:
- Online header analysis tools
- Desktop forensic utilities
- Open-source tools
- Security platform analysers
Write a brief note about what each tool does.
Best,
Ali.