SlideShare a Scribd company logo
Prashant Mahajan



Pune Null Meet, 22nd August, 2009
          Securematrix
 I am currently pursuing TY.BCA (Bachelors of
  Computer Applications) from Sinhgad College of
  Science
 I am Security Enthusiast
 I don’t know everything, nor do I pretend to know
  everything.
 I’m just a geek with time on my hands 
 What is Email Tracking?
 Can the Popular Email Service Providers Protect You ?
Tracking Emails
 Email tracking is a method for monitoring the e-mail
  delivery to intended recipient.
 Most tracking technologies utilize some form of
  digitally time-stamped record to reveal the exact time
  and date that your e-mail was received or opened, as
  well the IP address of the recipient.
 E-mail tracking is useful when the sender wants to
  know if the intended recipient actually received the e-
  mail, or if they clicked the links. However, due to the
  nature of the technology, e-mail tracking cannot be
  considered an absolutely accurate indicator that a
  message was opened or read by the recipient.
                                          Source: Wikipedia
Tracking Emails
 Some e-mail applications, such as Microsoft Office
  Outlook, employ a read-receipt tracking mechanism.
  The sender selects the receipt request option prior to
  sending the message, and then upon sending, each
  recipient has the option of notifying the sender that
  the message was received and/or read by the recipient.
 The technical term for these is MDN - Message
  Disposition Notifications, and they are requested by
  inserting one or more of the following lines into the
  email headers: X-Confirm-Reading-To: Disposition-
  Notification-To: or Return-Receipt-To:
                                         Source: Wikipedia
 When you send a tracked e-mail message, whether it's
  a simple text message or a graphical html message, the
  e-mail marketing system may embed a tiny, invisible
  tracking image (a single-pixel gif, sometimes called a
  web beacon) within the content of the message.
 When the recipient opens the message, the tracking
  image is referenced.




                                         Source: Wikipedia
Tracking Emails
 Email tracking is used by individuals, email marketers,
  spammers and phishers.
 To detect whether the email address is valid or not.
 Whether the email passes the spam filters.
 To detect unauthorized forwarding and distribution of
  copyrighted or confidential data.




                                          Source: Wikipedia
 www.ReadNotify.com
 www.E-mailsecure.com
 www.PointofMail.com
 www.BigString.com
 www.SpyPig.com
 www.Confimax.com
 www.DidTheyReadIt.com
 www.MsgTag.com
 www.ReplyMate.com
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Tracking Emails
Prashant Mahajan
prashant_3535@yahoo.co.in
+91-9822426910
Follow Me on Twitter @prashant3535

More Related Content

PPTX
mobile forensic.pptx
PPTX
Digital Evidence by Raghu Khimani
PPTX
Digital Forensic ppt
PPTX
Digital forensics
PPTX
Analysis of digital evidence
PDF
04 Evidence Collection and Data Seizure - Notes
PPTX
Cyber crime types
PPTX
E-mail Investigation
mobile forensic.pptx
Digital Evidence by Raghu Khimani
Digital Forensic ppt
Digital forensics
Analysis of digital evidence
04 Evidence Collection and Data Seizure - Notes
Cyber crime types
E-mail Investigation

What's hot (20)

PPTX
L6 Digital Forensic Investigation Tools.pptx
PDF
Email Forensics
PPTX
Digital forensic tools
PPTX
Incident response process
PDF
Social Media Forensics
PPTX
Digital forensics
PPTX
Digital forensics
PPTX
Mobile forensic
PPTX
Cyber evidence at crime scene
PPTX
Mobile Forensics
PPTX
Encase Forensic
PDF
Incident response methodology
PPTX
Autopsy Digital forensics tool
PPTX
Email investigation
PPT
Mobile forensics
PPT
Introduction to computer forensic
PPTX
Introduction to filesystems and computer forensics
PPTX
Network forensic
PPTX
CHA & LBA Addressing
PPTX
Network Forensics
L6 Digital Forensic Investigation Tools.pptx
Email Forensics
Digital forensic tools
Incident response process
Social Media Forensics
Digital forensics
Digital forensics
Mobile forensic
Cyber evidence at crime scene
Mobile Forensics
Encase Forensic
Incident response methodology
Autopsy Digital forensics tool
Email investigation
Mobile forensics
Introduction to computer forensic
Introduction to filesystems and computer forensics
Network forensic
CHA & LBA Addressing
Network Forensics
Ad

Viewers also liked (10)

PDF
One Laptop Per Child
PDF
What Firefox can tell about you? - Firefox Forensics
PDF
Footprinting
PDF
Data Hiding Techniques
PDF
Digital Crime & Forensics - Presentation
PDF
Digital Crime & Forensics - Report
PDF
Null bhopal Sep 2016: What it Takes to Secure a Web Application
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
One Laptop Per Child
What Firefox can tell about you? - Firefox Forensics
Footprinting
Data Hiding Techniques
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - Report
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Ad

Similar to Tracking Emails (20)

PPT
Cyber security and emails presentation refined
PDF
Keystroke with Data Leakage Detection for Secure Email Authentication
DOCX
UNIT-3.docx
PPTX
Anti phishing presentation
PDF
Mid Term Exam Solution for Eithical Hacking Exam
PPT
Cyber security and emails presentation
PDF
The Rising Importance of Email Security in a Digital-First World.pdf
PDF
Electronic Mail Security (University of Jeddah, Saudi Arabia)
DOCX
Cyber security.docx
PPTX
Save Online from Phising and Scam alert2
PDF
How LLM-Powered Email Protection Are the Ultimate Defense Against Phishing.pdf
PDF
What You Don’t Know about Email Security Protocols_ Could Cost You Millions.pdf
PPTX
Email: still the favourite route of attack
PDF
Review of the machine learning methods in the classification of phishing attack
DOCX
E-mail and Instant MessagingChapter 16Principles of Co.docx
PPTX
24_Basics_INTERNET_INTRANET_GYAN-LIS-CLASSES
PDF
Balancing Cloud-Based Email Benefits With Security
PPTX
grade 6.pptx
PPT
Web 2.0: Making Email a Useful Web App
PPTX
Chapter 2 System Security.pptx
Cyber security and emails presentation refined
Keystroke with Data Leakage Detection for Secure Email Authentication
UNIT-3.docx
Anti phishing presentation
Mid Term Exam Solution for Eithical Hacking Exam
Cyber security and emails presentation
The Rising Importance of Email Security in a Digital-First World.pdf
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Cyber security.docx
Save Online from Phising and Scam alert2
How LLM-Powered Email Protection Are the Ultimate Defense Against Phishing.pdf
What You Don’t Know about Email Security Protocols_ Could Cost You Millions.pdf
Email: still the favourite route of attack
Review of the machine learning methods in the classification of phishing attack
E-mail and Instant MessagingChapter 16Principles of Co.docx
24_Basics_INTERNET_INTRANET_GYAN-LIS-CLASSES
Balancing Cloud-Based Email Benefits With Security
grade 6.pptx
Web 2.0: Making Email a Useful Web App
Chapter 2 System Security.pptx

More from prashant3535 (6)

PDF
BSides Pune 2024
PDF
ADRecon - Detection CHCON 2018
PDF
Mimikatz
PDF
Active Directory Recon 101
PDF
ADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs Presentation
PDF
ADRecon BH ASIA 2018 : Arsenal Presentation
BSides Pune 2024
ADRecon - Detection CHCON 2018
Mimikatz
Active Directory Recon 101
ADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs Presentation
ADRecon BH ASIA 2018 : Arsenal Presentation

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
cuic standard and advanced reporting.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Modernizing your data center with Dell and AMD
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Modernizing your data center with Dell and AMD
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development

Tracking Emails

  • 1. Prashant Mahajan Pune Null Meet, 22nd August, 2009 Securematrix
  • 2.  I am currently pursuing TY.BCA (Bachelors of Computer Applications) from Sinhgad College of Science  I am Security Enthusiast  I don’t know everything, nor do I pretend to know everything.  I’m just a geek with time on my hands 
  • 3.  What is Email Tracking?  Can the Popular Email Service Providers Protect You ?
  • 5.  Email tracking is a method for monitoring the e-mail delivery to intended recipient.  Most tracking technologies utilize some form of digitally time-stamped record to reveal the exact time and date that your e-mail was received or opened, as well the IP address of the recipient.  E-mail tracking is useful when the sender wants to know if the intended recipient actually received the e- mail, or if they clicked the links. However, due to the nature of the technology, e-mail tracking cannot be considered an absolutely accurate indicator that a message was opened or read by the recipient. Source: Wikipedia
  • 7.  Some e-mail applications, such as Microsoft Office Outlook, employ a read-receipt tracking mechanism. The sender selects the receipt request option prior to sending the message, and then upon sending, each recipient has the option of notifying the sender that the message was received and/or read by the recipient.  The technical term for these is MDN - Message Disposition Notifications, and they are requested by inserting one or more of the following lines into the email headers: X-Confirm-Reading-To: Disposition- Notification-To: or Return-Receipt-To: Source: Wikipedia
  • 8.  When you send a tracked e-mail message, whether it's a simple text message or a graphical html message, the e-mail marketing system may embed a tiny, invisible tracking image (a single-pixel gif, sometimes called a web beacon) within the content of the message.  When the recipient opens the message, the tracking image is referenced. Source: Wikipedia
  • 10.  Email tracking is used by individuals, email marketers, spammers and phishers.  To detect whether the email address is valid or not.  Whether the email passes the spam filters.  To detect unauthorized forwarding and distribution of copyrighted or confidential data. Source: Wikipedia
  • 11.  www.ReadNotify.com  www.E-mailsecure.com  www.PointofMail.com  www.BigString.com  www.SpyPig.com  www.Confimax.com  www.DidTheyReadIt.com  www.MsgTag.com  www.ReplyMate.com