Description: PCAP Download: http://securityoverride.com/challenges/forensics/2/forensics2.rar
Tags: smtp wireshark packet capturing howto hacking cybersecurity ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Why would you want people to post the sender address to your website? Are you harvesting them for a spam run or something?
Perhaps you could clarify?
That was just the scenario for the packet capture file. But analyzing traffic would be a last resort to say if emails were unrecoverable and you wanted to figure out who was sending malicious emails, or spam for the matter. Now their would be more efficient ways of achieving this though. These are more just to show how to with wireshark.