2020
DOI: 10.5121/ijnsa.2020.12303
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Analysis of Email Forensics Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…Figure 1 presents the steps of the scenario. Wireshark open-source packet analyser was used to capture network traffic in order to monitor students' activity (Ghafarian, 2014). Patator, Medusa and Metasploit were the Kali Linux tools used to attack the SSH server.…”
Section: Educational Objectivesmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 1 presents the steps of the scenario. Wireshark open-source packet analyser was used to capture network traffic in order to monitor students' activity (Ghafarian, 2014). Patator, Medusa and Metasploit were the Kali Linux tools used to attack the SSH server.…”
Section: Educational Objectivesmentioning
confidence: 99%
“…Several freely available software tools were used in these exercises, including Angry IP Scanner (for Linux), Advanced IP Scanner (for Windows), ssh-keygen, PuTTY (for Windows), VirtualBox, etc. Wireshark open-source packet analyser was used to capture network traffic in order to monitor students' activity(Ghafarian, 2014). Patator, Medusa and Metasploit were the Kali Linux tools used to attack the SSH server.…”
mentioning
confidence: 99%
“…15 [48], [49] Email Forensic MailXaminer Investigating email from client [48]. It is also used to make a time limit when looking for a certain email.…”
Section: Digital Forensic Toolsmentioning
confidence: 99%
“…Communication via the Internet uses emails as mainstream for communication. Email forensics is a process of collecting evidence from emails since an email is an electronic communication over the Internet that carries messages to deliver files, documents, and other transaction elements [89], [90], [91]. An email, when transmitted, contains the source, content, actual sender and receiver information, date/time, protocols, and server information.…”
Section: E Email Forensicsmentioning
confidence: 99%
“…Email services used could either be webmail or a local mailbox [92]. [30], [20], [89] are some of the existing research surveys in the email forensics domain.…”
Section: E Email Forensicsmentioning
confidence: 99%