CEH Practical Guide
  • Certified Ethical Hacker (CEH v12 and CEH V13) Practical Guide: Complete Study Resources & Tips
  • Module 2. Footprinting and Reconnaissance
    • 1. Footprinting through Search Engines
    • 2. Perform Footprinting Through Internet Research Services
    • 3. Footprinting through Social Networking sites
    • 4. Website Footprinting
    • 5. WHOIS Footprinting
    • 6. DNS Footprinting
    • 7. Network footprinting
    • 8. Email Footprinting
    • 9. Footprinting using footprinting tools
    • 10. Perform Footprinting using AI
  • Module 3. Scanning Networks
    • 1. Host Discovery
    • 2. Port and Service Discovery
    • 3. Perform OS Discovery
    • 4. Scan beyond Firewalls and IDS
    • 5. Network scanning using various tools
    • 6. Perform Network Scanning using AI
  • Module 4. Enumeration
    • 1. Netbios Enumeration (Port 137)
    • 2. SNMP Enumeration (Port 161,162)
    • 3. LDAP Enumeration (Port 389)
    • 4. NFS Enumeration
    • 5. DNS Enumeration
    • 6. SMTP Enumeration
    • 7. RPC, SMB and FTP Enumeration
    • 8. Enumeration using various tools
    • 9. Perform Enumeration using AI
  • Module 5. Vulnerability Assessment
    • 1. Perform Vulnerability Research with Vulnerability Scoring Systems and Databases
    • 2. Perform Vulnerability Assessment using Various Vulnerability Assessment Tools
    • 3. Perform Vulnerability Analysis using AI
  • Module 6. System Hacking
    • 1. Gain access to the system
    • 2. Privilege Escalation
    • 3. Maintain Remote Access and Hide Malicious Activities
    • 4. Clear Logs to hide the Evidence of Compromise
    • 5. Active Directory (AD) Attacks
  • Module 7. Malware Threats
    • 1. Gain access to systems with Trojans
    • 2. Infect the system using Virus
    • 3. Perform Static Malware Analysis
    • 4. Perform Dynamic Malware Analysis
  • Module 8. Sniffing
    • 1. Perform Active Sniffing
    • 2. Perform Network Sniffing using Various Sniffing Tools
    • 3. Detect Network Sniffing
  • Module 9. Social Engineering
    • 1. Perform Social Engineering using tools
    • 2. Detect a Phishing attack
    • 3. Audit Organization security for phishing attacks
    • 4. Social Engineering using AI
  • Module 10. Denial of Service
    • 1. Perform DOS and DDOS with various techniques
    • 2. Detect and Protect DOS and DDOS attacks
  • Module 11. Session Hijacking
    • 1. Perform Session Hijacking
    • 2. Detect Session Hijacking
  • Module 12. Evading IDS, antivirus and Honeypots
    • 1. Intrusion Detection using various tools
    • 2. Evade Firewall using Evasion Techniques
  • Module 13. Hacking Web Servers
    • 1. Footprint the Webserver
    • 2. Perform Webserver attacks
    • 3. Perform a Web Server Hacking using AI
  • Module 14. Hacking Web Applications
    • 1. Footprint the Web Infrastructure
    • 2. Perform Web applications Attacks
    • 3. Detect Web Vulnerabilities using using web application security tools
    • 4. Perform Web Application Hacking using AI
  • Module 15. SQL Injection
    • 1. Perform SQL Injection attacks
    • 2. Detect SQL Vulnerabilities using different tool
    • 3. Perform SQL Injection using AI
  • Module 16. Hacking Wireless Networks
    • 1. Footprint a wireless Network
    • 2. Perform Wireless Traffic Analysis
    • 3. Perform Wireless Attacks
  • Module 17. Hacking Mobile Platforms
    • 1. Hack Android Devices
    • 2. Secure Android Device
  • Module 18. IoT and OT Hacking
    • 1. Footprinting IoT and OT devices
    • 2. Capture and Analyze IoT traffic
    • 3. Perform IoT Attacks
  • Module 19. Cloud Computing
    • 1. Perform Reconnaissance on Azure
    • 2. S3 Bucket Enumeration
    • 3. Exploit S3 buckets
    • 4. Perform Privilege Escalation to Gain Higher Privileges
    • 5. Perform Vulnerability Assessment on Docker Images
  • Module 20. Cryptography
    • 1. Encrypt the Information using Various Cryptography Tools
    • 2. Create a self signed Certificate
    • 3. Perform Disk Encryption
    • 4. Cryptanalysis Using different tools
    • 5. Perform Cryptography using AI
  • Tips for exams
  • Additional Resources
Powered by GitBook
On this page
  • 1. Gather Information about a Target by Tracing Emails using eMailTrackerPro
  • Track an email or a message.
  • Track your email and know when it gets opened
  • Other Email Tracking tools

Was this helpful?

  1. Module 2. Footprinting and Reconnaissance

8. Email Footprinting

Email tracking allows you to collect information such as IP addresses, mail servers, OS details, geolocation, information about service providers involved in sending the mail etc

Previous7. Network footprintingNext9. Footprinting using footprinting tools

Last updated 2 months ago

Was this helpful?

1. Gather Information about a Target by Tracing Emails using eMailTrackerPro

Windows tool to analyze headers also provide other options like when email was opened by recipient.

  1. To trace email headers, click the My Trace Reports icon from the View section. (here, you will see the output report of the traced email header).

  2. Click the Trace Headers icon from the New Email Trace section to start the trace.

  3. A pop-up window will appear; select Trace an email I have received. Copy the email header from the suspicious email you wish to trace and paste it in the Email headers: field under Enter Details section.

  4. For finding email headers, open any web browser and log in to any email account of your choice; from the email inbox, open the message you would like to view headers for.

    In Gmail, find the email header by following the steps:

    • Open an email; click the dots (More) icon arrow next to the Reply icon at the top-right corner of the message pane.

    • Select Show original from the list.

    • The Original Message window appears in a new browser tab with all the details about the email, including the email header

    In Outlook, find the email header by following the steps:

    • Double-click the email to open it in a new window

    • Click the … (More actions) icon present at the right of the message-pane to open message options

    • From the options, click View

    • The view message source window appears with all the details about the email, including the email header

  5. Copy the entire email header text and paste it into the Email headers: field of eMailTrackerPro, and click Trace.

    Here, we are analyzing the email header from gmail account. However, you can also analyze the email header from outlook account.

  6. The My Trace Reports window opens.

  7. The email location will be traced in a Map (world map GUI). You can also view the summary by selecting Email Summary on the right-hand side of the window. The Table section right below the Map shows the entire hop in the route, with the IP and suspected locations for each hop.

  8. To examine the Network Whois data, click the Network Whois button below Email Summary to view the Network Whois data.

Track an email or a message.

Whenever someone clicks the link, we get the data about the target.

Track your email and know when it gets opened

Other Email Tracking tools

Screenshot
Screenshot
st10.jpg
mail2.jpg
mail3.jpg
13.jpg
st14.jpg
Email Footprinting
Email Tracker Pro
Grabify IP Logger & URL ShortenerGrabify IP Logger & URL Shortener
Email tracking for Gmail — Mailtrack
GitHub - m4ll0k/Infoga: Infoga - Email OSINTGitHub
MX Lookup Tool - Check your DNS MX Records online - MxToolboxMxToolbox
Logo
Reverse Lookup to Search and Verify Identities - Social Catfish
IP Address to IP Location and Proxy Information | IP2LocationIP2Location
Certified Ethical Hacker (CEHv12) Practical hands on LabsUdemy
Logo
Logo
Logo
Logo
Logo
Logo
Logo