Skip to main content

Backtracking EMAIL Messages

Backtracking EMAIL Messages

Tracking email back to its source: Twisted Evil
cause i hate spammers... Evil or Very Mad

Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged.

So how do you determine where a message actually came from? You have to understand how email messages are put together in order to backtrack an email message. SMTP is a text based protocol for transferring messages across the internet. A series of headers are placed in front of the data portion of the message. By examining the headers you can usually backtrack a message to the source network, sometimes the source host. A more detailed essay on reading email headers can be found .

If you are using Outlook or Outlook Express you can view the headers by right clicking on the message and selecting properties or options.

Below are listed the headers of an actual spam message I received. I've changed my email address and the name of my server for obvious reasons. I've also double spaced the headers to make them more readable.


Return-Path:

X-Original-To: davar@example.com

Delivered-To: davar@example.com

Received: from 12-218-172-108.client.mchsi.com (12-218-172-108.client.mchsi.com [12.218.172.108])
by mailhost.example.com (Postfix) with SMTP id 1F9B8511C7
for ; Sun, 16 Nov 2003 09:50:37 -0800 (PST)

Received: from (HELO 0udjou) [193.12.169.0] by 12-218-172-108.client.mchsi.com with ESMTP id <536806-74276>; Sun, 16 Nov 2003 19:42:31 +0200

Message-ID:

From: "Maricela Paulson"

Reply-To: "Maricela Paulson"

To: davar@example.com

Subject: STOP-PAYING For Your PAY-PER-VIEW, Movie Channels, Mature Channels...isha

Date: Sun, 16 Nov 2003 19:42:31 +0200

X-Mailer: Internet Mail Service (5.5.2650.21)

X-Priority: 3

MIME-Version: 1.0

Content-Type: multipart/alternative; boundary="MIMEStream=_0+211404_90873633350646_4032088448"


According to the From header this message is from Maricela Paulson at s359dyxxt@yahoo.com. I could just fire off a message to abuse@yahoo.com, but that would be waste of time. This message didn't come from yahoo's email service.

The header most likely to be useful in determining the actual source of an email message is the Received header. According to the top-most Received header this message was received from the host 12-218-172-108.client.mchsi.com with the ip address of 21.218.172.108 by my server mailhost.example.com. An important item to consider is at what point in the chain does the email system become untrusted? I consider anything beyond my own email server to be an unreliable source of information. Because this header was generated by my email server it is reasonable for me to accept it at face value.

The next Received header (which is chronologically the first) shows the remote email server accepting the message from the host 0udjou with the ip 193.12.169.0. Those of you who know anything about IP will realize that that is not a valid host IP address. In addition, any hostname that ends in client.mchsi.com is unlikely to be an authorized email server. This has every sign of being a cracked client system.


Here's is where we start digging. By default Windows is somewhat lacking in network diagnostic tools; however, you can use the tools at to do your own checking.

davar@nqh9k:[/home/davar] $whois 12.218.172.108

AT&T WorldNet Services ATT (NET-12-0-0-0-1)
12.0.0.0 - 12.255.255.255
Mediacom Communications Corp MEDIACOMCC-12-218-168-0-FLANDREAU-MN (NET-12-218-168-0-1)
12.218.168.0 - 12.218.175.255

# ARIN WHOIS database, last updated 2003-12-31 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.

I can also verify the hostname of the remote server by using nslookup, although in this particular instance, my email server has already provided both the IP address and the hostname.

davar@nqh9k:[/home/davar] $nslookup 12.218.172.108

Server: localhost
Address: 127.0.0.1

Name: 12-218-172-108.client.mchsi.com
Address: 12.218.172.108

Ok, whois shows that Mediacom Communications owns that netblock and nslookup confirms the address to hostname mapping of the remote server,12-218-172-108.client.mchsi.com. If I preface a www in front of the domain name portion and plug that into my web browser, http://www.mchsi.com, I get Mediacom's web site.

There are few things more embarrassing to me than firing off an angry message to someone who is supposedly responsible for a problem, and being wrong. By double checking who owns the remote host's IP address using two different tools (whois and nslookup) I minimize the chance of making myself look like an idiot.

A quick glance at the web site and it appears they are an ISP. Now if I copy the entire message including the headers into a new email message and send it to abuse@mchsi.com with a short message explaining the situation, they may do something about it.

But what about Maricela Paulson? There really is no way to determine who sent a message, the best you can hope for is to find out what host sent it. Even in the case of a PGP signed messages there is no guarantee that one particular person actually pressed the send button. Obviously determining who the actual sender of an email message is much more involved than reading the From header. Hopefully this example may be of some use to other forum regulars.

Comments

Popular posts from this blog

AIRTEL LATEST CHEAT AND TRICK 2013

AIRTEL LATEST CHEAT AND TRICK 2013 It’s been long since I updated this blog. I have just been busy but I am back and I am going to be updating this blog regularly so please tell your friends and loved ones that babanature is back with some awesome cheats for your pc’s. Airtel have been browsing free for some time now and many people still don’t know how it works so today, I am going to show you how to set your airtel to unlimited mb. This cheat is courtesy Juliusluv, Igboji and Dannygeo. So let’s go straight to the cheat… REQUIREMENT FOR THE CHEAT TO WORK ·          One airtel sim and etisalat sim ·          One touch light phone that is not web enable (like; 3310, 2310 e.t.c) ·          Load the sim with 100 or 400 or 1200 (don’t worry the money won’t be touched) Do you have all this in place? Now let’s proceed… Put your Airtel sim in a none browing phone. like the above mentioned.   Load the Airtel sim with any of the mentioned money Now save these co

MTN LATEST CHEAT WITHOUT SUBSCRIPTION OR VPN

One of our good friend "Ahmed Kudu" finally posted the MTN sim hack that everybody is collecting money for. I will be posting the cheat word for word here and do thank him for unleashing such secrete because e no easy :D HACK YOUR MTN SIM FOR UNLIMITED No body hates free browsing, That's why I want to share this free browsing trick... its for mtn network & this is what some guys are selling (currently) on the net, & They charge who ever show interest in this more than u think... because you are here, That why you will enjoy this... For free... let go.. this Free Browsing is for mtn network.. REQUIREMENT: #Mtn Sim #250 Naira #Your Time.. #Your Brain (no mistake) HOW?? Step 1: subscribe to mtn 2 hour plan by sending 2H to 131 (2days) step2: browse for exactly 30 mins.. Step 3: remove your battery (note the exact time of the battery removal) step 4: after exactly 24 hours, insert your battery back to your phone step 5: sim hacked, Enjoy unlimited browsing till you

LATEST ETISALAT UNLIMITED CHEAT 2013

Ok! Ahmed Kuddu just gave us one sweet and lovely cheat and to be truth with you all, it is working 100% So do follow the instruction prescribe to you below. ETISALAT UNLIMITED .FIRST load a recharge card of N1000 to ur eti line Then subscribe to Monthly Blackberry plan. (To Subscribe for Etisalat BIS Send SOM to 399 or Dial *499*2#). Wait till you get an Etisalat SMS that subscription is sucessful Create a new profile on your modem with the following settings APN: blackberry.net Dial Up: *99# username/pass: blank Advanced Settings Primary DNS: 8.8.8.8 Secondary or Alternate: 8.8.4.4 save and exit. configure your browser to use 10.71.170.5:8080 You can then start surfing FOR MOBILE USERS APN: blackberry.net SET UR DNS ADDRESS TO Primary DNS: 8.8.8.8 Secondary DNS: 8.8.4.4 IP: 10.71.170.5 Port: 8080 YOU CAN THEN START SURFING goodluck U CAN USE PROXIFIER WIT 10.71.170.5 PORT 8080 TO PAWA OTHER APPLICATION... If you still have problem, do let us know below using the comment box. th