1 00:00:00,840 --> 00:00:08,790 An attacker may send malicious emails to employees in order to target an organization, so as a professional 2 00:00:08,790 --> 00:00:13,700 ethical hacker, you should be able to trace e-mails, right? 3 00:00:15,960 --> 00:00:22,680 So we're going to use a tool called E-mail Packer to see in order to trace the e-mail, we will going 4 00:00:22,680 --> 00:00:30,450 to analyze its headers, headers of messages, emails, and immediately. 5 00:00:30,470 --> 00:00:38,790 Kimbro is a tool which will going to help us in order to know the exact geolocation from which the email 6 00:00:38,790 --> 00:00:43,090 has been saying, OK, it will tell us about ISP and business. 7 00:00:44,730 --> 00:00:54,720 So let's go to you, make dot com and then click on download again for the windows and click download. 8 00:00:58,970 --> 00:01:09,710 OK, so let me download it says Compatability Windows XP seven and eight, but don't worry, it will 9 00:01:09,710 --> 00:01:11,210 also work on Windows 10. 10 00:01:12,440 --> 00:01:16,010 OK, I have used it in my Windows 10. 11 00:01:24,730 --> 00:01:27,040 Downloading computer, let's install it. 12 00:01:29,490 --> 00:01:32,820 Next, I agree, next. 13 00:01:33,380 --> 00:01:35,190 Next is Don. 14 00:01:46,650 --> 00:01:54,670 Let me pause this video, so the installation has been completed and this is how it looks like. 15 00:01:55,110 --> 00:01:58,260 OK, now let's open an email. 16 00:02:03,530 --> 00:02:05,630 And let me go to Gmail dot com. 17 00:02:11,610 --> 00:02:12,480 Let's open it. 18 00:02:19,580 --> 00:02:20,690 It's loading. 19 00:02:29,610 --> 00:02:34,710 OK, now let's open a random e-mail, maybe this one. 20 00:02:39,650 --> 00:02:42,100 So we will try to trace this e-mail. 21 00:02:45,480 --> 00:02:50,840 Now, first of all, click here on these three jobs, OK? 22 00:02:54,860 --> 00:02:57,500 And then click on show or original, 23 00:03:00,620 --> 00:03:00,970 right? 24 00:03:10,270 --> 00:03:17,020 OK, so we have our original message click on CAPATO Play Clipboard. 25 00:03:20,340 --> 00:03:27,300 As I have played on Capital Clipboard, it has copied the header, OK, and or you can manually copy 26 00:03:27,300 --> 00:03:27,900 this as well. 27 00:03:27,950 --> 00:03:33,110 OK, so this is the header right now. 28 00:03:33,120 --> 00:03:37,380 Let's move to our pool and. 29 00:03:40,200 --> 00:03:53,490 Go to fight, click on press headers, OK, and paste the copied header here and now simply click on 30 00:03:53,820 --> 00:03:54,330 Chris. 31 00:03:57,090 --> 00:04:02,250 OK, now it will start tracing the email. 32 00:04:05,140 --> 00:04:08,180 Go to my address reports and you will see the progress. 33 00:04:08,920 --> 00:04:09,400 OK? 34 00:04:16,530 --> 00:04:24,060 The process has now been completed, and as you can see, the location is showing that U.S. OK, and 35 00:04:24,060 --> 00:04:29,670 these are the hopes between sender and receiver, OK, and this is the main server. 36 00:04:29,670 --> 00:04:33,170 Google has been used to send me an e-mail, OK? 37 00:04:33,720 --> 00:04:35,700 And this is the IP address. 38 00:04:36,360 --> 00:04:36,710 Right. 39 00:04:37,020 --> 00:04:43,710 So this is how you can trace the e-mail and find out whether it is genuine or not. 40 00:04:43,980 --> 00:04:47,880 OK, so you can trace any email that you want. 41 00:04:49,020 --> 00:04:54,980 And but Seve's, this is a drivers and OK, it is available for 15 days period. 42 00:04:55,830 --> 00:04:56,240 Right.