Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Email Header Analysis and Forensic Investigation

Автор: 13Cubed

Загружено: 2020-01-13

Просмотров: 162753

Описание:

Do you know how to properly read and analyze an email message header? In this episode, we’ll take a look at two examples – one legitimate, and one not-so-legitimate. We’ll learn which header fields are most commonly referenced for analysis, how to determine a message’s true origin, how to read SPF and DKIM information, and we’ll even take a quick look at DMARC. Whether you’re completely new to this concept or a seasoned veteran, this episode has something for you.

🙏Special thanks to Arman Gungor (@armangungor) for lending his expertise in making this episode.

** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. **

Leveraging DKIM in Email Forensics:
https://www.metaspike.com/leveraging-...

What is DMARC?:
https://dmarc.org/

Email Header Plugin for Sublime Text 3:
https://packagecontrol.io/packages/Em...

Background Music Courtesy of Anders Enger Jensen:
   / hariboosx  

#Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics #EmailForensics

Email Header Analysis and Forensic Investigation

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#5726 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "OTea54BelTg" ["related_video_title"]=> string(40) "Windows MACB Timestamps (NTFS Forensics)" ["posted_time"]=> string(19) "7 лет назад" ["channelName"]=> string(7) "13Cubed" } [1]=> object(stdClass)#5699 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "reRzWHUwI80" ["related_video_title"]=> string(84) "12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> string(12) "John Hubbard" } [2]=> object(stdClass)#5724 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "yuhOgyz1cXs" ["related_video_title"]=> string(56) "Email authentication Explained, SPF, DKIM, DMARC records" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(17) "Office365Concepts" } [3]=> object(stdClass)#5731 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "1PAGcPJFwbE" ["related_video_title"]=> string(32) "Introduction to Memory Forensics" ["posted_time"]=> string(19) "8 лет назад" ["channelName"]=> string(7) "13Cubed" } [4]=> object(stdClass)#5710 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "YSIs1M91uS8" ["related_video_title"]=> string(51) "Email Headers Explained and How They Might Help You" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> string(8) "Ask Leo!" } [5]=> object(stdClass)#5728 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "qedIyy5KesQ" ["related_video_title"]=> string(43) "Email Header Analysis and Digital Forensics" ["posted_time"]=> string(19) "5 лет назад" ["channelName"]=> string(9) "BlackPerl" } [6]=> object(stdClass)#5723 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "wu4-nREmzGM" ["related_video_title"]=> string(24) "LNK Files and Jump Lists" ["posted_time"]=> string(19) "7 лет назад" ["channelName"]=> string(7) "13Cubed" } [7]=> object(stdClass)#5733 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "do3JVxf_Cu8" ["related_video_title"]=> string(82) "КАК я стал IT специалистом за ПОЛ ГОДА после 30." ["posted_time"]=> string(23) "1 месяц назад" ["channelName"]=> string(30) "WebTestingPro | Sergey Yaushev" } [8]=> object(stdClass)#5709 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "c9fLp5uIxp8" ["related_video_title"]=> string(55) "How DKIM SPF & DMARC Work to Prevent Email Spoofing" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> string(20) "Thobson Technologies" } [9]=> object(stdClass)#5727 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "o-935Oep7Cg" ["related_video_title"]=> string(44) "SOC Analyst Phishing Email Analysis Tutorial" ["posted_time"]=> string(27) "9 месяцев назад" ["channelName"]=> string(15) "Sohail Ershadi " } }
Windows MACB Timestamps (NTFS Forensics)

Windows MACB Timestamps (NTFS Forensics)

12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works

12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works

Email authentication Explained, SPF, DKIM, DMARC records

Email authentication Explained, SPF, DKIM, DMARC records

Introduction to Memory Forensics

Introduction to Memory Forensics

Email Headers Explained and How They Might Help You

Email Headers Explained and How They Might Help You

Email Header Analysis and Digital Forensics

Email Header Analysis and Digital Forensics

LNK Files and Jump Lists

LNK Files and Jump Lists

КАК я стал IT специалистом за ПОЛ ГОДА после 30.

КАК я стал IT специалистом за ПОЛ ГОДА после 30.

How DKIM SPF & DMARC Work to Prevent Email Spoofing

How DKIM SPF & DMARC Work to Prevent Email Spoofing

SOC Analyst Phishing Email Analysis Tutorial

SOC Analyst Phishing Email Analysis Tutorial

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]