Analyzing Email Headers

What's the purpose of analyzing email headers? May be you're trying to identify an actual sender, block a malicious sender, validating some threat analytics, or can't block a sender due to spoofing. Cyber security and forensic professionals analyze headers daily as part of incident response and/or forensic investigations. Plus this useful for aspiring students.

To analyze headers, you're going to need a copy of the original email (not a forwarded or text copied one). "Forwarding as An Attachment" will preserve the original data. Regular forwarding (right clicking) will simply container header info from the forwarding address which is not useful. Once you've copied the header info, you can use Microsoft's Remote Connectivity Analyzer website to parse the data out for easier analysis.

If you use Gmail and have the email open, click the three dot stack next to the reply arrow button. Select View Original Message to see the header information.

If you use Microsoft Outlook Exchange, double click and open the email, find the Tags tab at the top. A little window will pop open with all the header information. Highlight and copy all the data

If you use Microsoft Office 365 (cloud Exchange), click on the arrow down menu button next to Reply-all, and then select Message Details out of the list.

In either of these cases, copy the data and open the MS Remote Connectivity Analyzer. Just below the information banner, select Message Analyzer. Paste the header data into the field and press the Analyze Headers button.

Regardless of spoofed (faked) sender/source email or IP addresses, you'll see where the actual email originated. You can also find the actual source sender information even if they're using an cloud email messaging service such as those used by threat actors or irresponsible vendors. Either way, with this information, you can mitigate/remediate (block or blacklist) or collect forensic evidence regarding malicious senders.

To view or add a comment, sign in

More articles by Eric Garay

  • Elevated Security: End of Life Visibility

    Information security vendors tend to think there's no value in supporting end of life (EOL) operating systems. For…

  • Starting in Cyber Security

    How do I get started in cyber security? This is a common question I hear from people new to the career or that haven't…

    1 Comment
  • The Difference Between Threat Intelligence and Random Information

    Some vendors offer Threat Intelligence by monitoring information about you on the surface and dark web for an annual…

    2 Comments
  • Preventing Phishing

    What is phishing? It's a social engineering tactic used to create something that looks legitimate in order to acquire…

  • Is Your Threat Intelligence Service Worth Its Weight in Gold?

    Recently, there are been a new Experian commercial where they claim they can protect you by monitoring information…

  • What Makes a Good SIEM?

    A professional colleague asked this question one afternoon. His small business had grown to become a sizable medium…

  • So You Want to Build a SOC?

    A Security Operations Center (SOC) by definition is essentially a centralized location where a Cyber Security team…

  • Cyber Security Students Seeking Opportunities

    Many aspiring Cyber Security students ask what can they do to attract the attention of companies and recruiters…

    1 Comment
  • Mergers and Vulnerabilities

    Change is an inevitable occurrence of any large enterprise network. Businesses divest and merge with the seasons.

Others also viewed

Explore content categories