Create an account Home  ·  Topics  ·  Downloads  ·  Your Account  ·  Submit News  ·  Top 10  
Modules
· Home
· Content
· FAQ
· Forensic Downloads
· Forensics Feedback
· Forums
· Members List
· Statistics
· Surveys
· Top 10
· Topics
· Training Reviews
· Web Links
· Your Account

Our Membership

Latest: bludhound
New Today: 0
New Yesterday: 0
Overall: 29409

Computer Forensics
This is a free and open peer to peer medium for digital and computer forensics professionals and students. Please help us maintain it by contributing and perhaps linking to us from your own website.

Recent Posts

 Can anyone suggest me a topic under printers forensics
 Unallocated clustered as court evidence
 Encryption
 I know how to recover ost file 2016
 IE11 and Keywords

Computer Forensics World Forums


Pages Served
We received
52826235
page views since August 2004

Security Sources

FTC
OnGuard Online
ISO 17799 ISO 27001
ISO 27000 Toolkit
ISO 27001 & 27000
Cryptography
Security Policies

Computer Forensics World: Forums

Computer Forensics World :: View topic - email analysis
 Forum FAQForum FAQ   SearchSearch   UsergroupsUsergroups   ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

email analysis

 
Post new topic   This topic is locked: you cannot edit posts or make replies.    Computer Forensics World Forum Index -> Digital Forensics: Getting Started
View previous topic :: View next topic  
Author Message
tamilachi
Newbie
Newbie


Joined: Jun 03, 2013
Posts: 5

PostPosted: Sat Jun 15, 2013 7:37 pm    Post subject: email analysis Reply with quote

Mike is a network admin in Solar Inc. Recently he received several complaints regarding the slow responses of their Business to Business (B2B) applications. He starts investigating this problem and found a big load on their daily email utilization which changed from the usual ten thousand emails per day to a hundred thousand emails per day! He continued to check how many connections the mail severs have and from where these connections are coming from. He found that there is a zombie network contains mostly IP addresses from Asia Pacific, Africa and Mexico networks. The attacker(s) was(were) sending as many messages as possible to e-mail boxes on his email servers with original sender residing on YAHOO and GMAIL free mail hosting in the zombie network. His mail servers were expected to be one of mail servers which would flood targeted services by not delivering reports since each message has more than 10 invalid recipients.
Mike asked you as a forensics expert to investigate this case. Explain in detail the steps you would follow. Specify and justify the tool that you used in each step.

How to give proper answer for this
Back to top
View user's profile
PreferredUser
Newbie
Newbie


Joined: Jan 01, 2007
Posts: 1130
Location: USA

PostPosted: Sun Jun 16, 2013 1:12 am    Post subject: Reply with quote

I would probably go to school, get training in a forensic degree program, and search for an answer in the coursework I would have taken during the program.
Back to top
View user's profile
cybercop
Newbie
Newbie


Joined: Nov 01, 2005
Posts: 551
Location: Marion, Indiana, USA

PostPosted: Sun Jun 16, 2013 3:52 am    Post subject: Reply with quote

We don't do homework.
Back to top
View user's profile
Display posts from previous:   
Post new topic   This topic is locked: you cannot edit posts or make replies.    Computer Forensics World Forum Index -> Digital Forensics: Getting Started All times are GMT + 10 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Powered by phpBB 2.0.10 © 2001 phpBB Group
phpBB port v2.1 based on Tom Nitzschner's phpbb2.0.6 upgraded to phpBB 2.0.4 standalone was developed and tested by:
ArtificialIntel, ChatServ, mikem,
sixonetonoffun and Paul Laudanski (aka Zhen-Xjell).

Version 2.1 by Nuke Cops 2003 http://www.nukecops.com

Forums ©

 

TMs property of their respective owner. Comments property of posters. 2007 Computer Forensics Science World.
Digital forensic computing news syndication: Computer Forensics Training News or UM Text
Software is copyrighted phpnuke.org (c)2003, and is free under licence agreement. All Rights Are Reserved.