Skip to content

0x0allenace/Email_Header_Analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

📧 Email Header Analysis Practical Exercise

This practical exercise will help you understand how to analyze suspicious email headers and detect red flags that indicate phishing or malicious intent.

Objectives

  • Understand the structure of an email header
  • Identify key fields that reveal sender information
  • Trace the email’s path using "Received" headers
  • Spot spoofing or anomalies in authentication results (SPF, DKIM, DMARC)

Tools Required

  • Any email client or webmail service with “View Raw Header” option (e.g Thunderbird Email Client)
  • Online header analyzers (e.g., Google’s toolbox, MXToolbox)
  • Command-line tools: whois, dig, nslookup

🛠 Lab Setup

  • Download the sample .eml files from the link below.
    Download eml_files.7z

  • Extract the archive to your working directory.

  • You will analyze five .eml files and identify why each email header is suspicious.

  • After completing the analysis.

🔍 Step 1: Open in Thunderbird

  • Right-click the .eml file and select Open with → Thunderbird.

Thunderbird Email View

  • Review the displayed email for obvious anomalies (suspicious sender, spelling errors, spoofed domains, etc.).

Thunderbird Email Anomalies

🔎 Step 2: View Full Headers in Thunderbird

  • In Thunderbird, go to:
    Menu → View → Headers → All

  • Scroll through the email header to inspect all details.

Thunderbird Header Option

Full Email Header Scroll

💻 Step 3: Analyze in a Text Editor (Optional)

  • Open the .eml file in Sublime Text or any preferred text editor.
  • Select the Email Header syntax package (bottom-right) to format the header for readability.

Sublime Email Header View

🌐 Step 4: Use Online Email Header Tools (Optional)

  • Copy and paste the raw header into an online header analysis tool.
  • These tools break down each field (Received, DKIM, SPF, etc.) to highlight suspicious entries.

Online Header Analysis Tool

Step 5: Check Authentication Results

Look at:

  • SPF: Pass/Fail
  • DKIM: Valid/Invalid
  • DMARC: Pass/Fail

Tip: Always correlate multiple indicators in the email header (sender, domain, SPF/DKIM, Received hops) instead of relying on one field alone.

About

A practical email header analysis lab focused on detecting phishing indicators, tracing email paths, and analyzing authentication results (SPF, DKIM, DMARC) for threat detection.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors