Phising email

Assignment Help Computer Network Security
Reference no: EM13528

Phising email

* It is multipart, what are the two parts?

* The HTML part, is it inviting the recepient to click somewhere?

* What is the email proporting to do when the link is clicked?

* Where will the browser actually go, when the link is clicked?

* From whom does the email proport to come from, and by what (at least) two ways does it say this?

* According to the headers, where does the email actually come from?

Format of Email

Return-Path: <[email protected]>

Received: from ( [])

by (8.14.4/8.14.4) with ESMTP id r2KC7sZo057346;

     Wed, 20 Mar 2013 08:07:54 -0400 (EDT)

     (envelope-from [email protected])

X-Spam-Flag: YES

Received: from ([])

by with ESMTP; 20 Mar 2013 08:07:49 -0400

Received: from localhost (localhost.localdomain [])

by (Postfix) with ESMTP id DB03C10DC00B;

     Wed, 20 Mar 2013 08:07:47 -0400 (EDT)

X-Virus-Scanned: amavisd-new at

Received: from ([])

bylocalhost ( []) (amavisd-new, port 10024)

with ESMTP id jcghw0+YylvM; Wed, 20 Mar 2013 08:07:47 -0400 (EDT)

Received: from Unknown (unknown [])

by (Postfix) with ESMTPSA id 9D99D10D400B;

     Wed, 20 Mar 2013 08:02:29 -0400 (EDT)

Message-ID: <B81EF58EFA444973823E1A9399194842@bjrrebr>

From: "University of xxxx" <[email protected]>

Subject: Notice From University of xxxx

Date: Wed, 20 Mar 2013 08:33:40 -0400

MIME-Version: 1.0

Content-Type: multipart/mixed;boundary="----=_20130324204259_94270"

X-Priority: 3

X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook Express 6.00.2900.5512

X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512

To: undisclosed-recipients:;

X-Math-Scanned: Phantom Zone Evaluation                                                                                                                                                                                                                                                         


Content-Type: text/plain; charset="iso-8859-1"

Content-Transfer-Encoding: 8bit


---------------------------- Original Message ----------------------------

Subject: Notice From University of xxxx

From:    "University of xxxx" <[email protected]>

Date:    Wed, March 20, 2013 8:33 am

To:      undisclosed-recipients:;



Dear User,


Your e-mail will expire soon.


For security reasons, please use our website below to update your personal



University of xxxx



Content-Type: text/html; name="untitled-[2].html"

Content-Transfer-Encoding: 8bit

Content-Disposition: attachment; filename="untitled-[2].html"


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">


<META content="text/html; charset=utf-8" http-equiv=Content-Type>

<META name=GENERATOR content="MSHTML 6.00.6000.16674">



<BODY bgColor=#ffffff>

<DIV id=yui_3_7_2_1_1363110797648_17022>

<DIV id=yiv1193796572yui_3_7_2_1_1363110797648_3280>

<DIV id=yiv1193796572>

<DIV id=yiv1193796572yui_3_7_2_1_1363110797648_2688>

<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_2725>

<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_2724 align=left><FONT

id=yiv1193796572yui_3_7_2_1_1362975386038_2723 size=2 face=Arial>

<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_4825><FONT

style="FONT-SIZE: 10pt" id=yiv1193796572yui_3_7_2_1_1362975386038_4829

color=#808080 face=Arial>Dear User, <BR><BR>Your e-mail will expire


<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_4824>&nbsp;</DIV><FONT size=2


<DIV></DIV></FONT><FONT id=yiv1193796572yui_3_7_2_1_1362975386038_2722


<DIV style="MIN-HEIGHT: 16px; WIDTH: 842px"


id=yiv1193796572yui_3_7_2_1_1362975386038_4822 color=#808080><SPAN

style="FONT-SIZE: 10pt" id=yiv1193796572yui_3_7_2_1_1362975386038_4821>For

security reasons, please use our website below to update your personal


<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_2721><SPAN

style="FONT-SIZE: 10pt" id=yiv1193796572yui_3_7_2_1_1362975386038_2762><FONT

color=#808080><BR></FONT><FONT id=yiv1193796572yui_3_7_2_1_1363110797648_3494

color=#808080><A id=yiv1193796572yui_3_7_2_1_1363110797648_3493

href="" rel=nofollow

target=_blank><SPAN id=yiv1193796572lw_1363136150_0


id=yiv1193796572yui_3_7_2_1_1362975386038_2788 color=#808080><BR><BR><SPAN

id=yiv1193796572lw_1362982925_1 class=yiv1193796572yshortcuts><SPAN

id=yiv1193796572lw_1363134212_0 class=yiv1193796572yshortcuts><SPAN

id=lw_1363138633_0 class=yshortcuts>University of



Reference no: EM13528

Questions Cloud

Write a report on im operations governance : Write a report on IM operations governance
Issues in telecommunications : Creating, sharing, and managing knowledge for innovation and Service - Managing service strategies and service innovation.
Describe the types of financial ratios : Describe the types of financial ratios and other financial performance measures that are used during venture's successful life cycle.
Calculate and plot the error in the numerical derivative : Write a program to calculate and plot the error in the numerical estimate of the derivative.
Phising email : Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?
Solve the initial value problem : Use Laplace transformation to solve the initial value problem
Create a custom application using eclipse : Create a custom Application Using Eclipse Android Development
Planning and decision making : Types of Information Technology Capabilities and Competitive Advantage
Chart of the topological manifold : De?nition of smoothness of functions on a smooth manifold is chart independent and hence geometric.


Write a Review


Computer Network Security Questions & Answers

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  Analyse security procedures

Analyse security procedures

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd