The scp command is available on UNIX based systems (including Linux and Mac OS) and allows files to be copied to, from, or between different hosts. It uses secure shell or ssh for data transfer and provides the same authentication and same level of security as ssh.
Here you’ll find a document outlining the syntax required when using the scp command.
Https is the secure version of the http protocol for connecting to web-servers.
Websites that use the https (hyper text transfer protocol secure) protocol provide an encrypted connection between your device and the web-server hosting the page you have requested.
However, just because you type in https://amazon.co.uk in to your browser bar for example, does not necessarily mean you are connected to the real amazon.co.uk website.
This is because the address amazon.co.uk is converted to the IP address of the web-server hosting the page by a service known as the Domain Name System or DNS.
This works like a phone book, so you type in a web address you want to visit and your DNS looks up the number or IP address of the appropriate web-server and retrieves the web page from the appropriate web-server for you.
If the DNS has been compromised or hijacked in anyway, when you type in https://amazon.co.uk, you are sent to the IP address of a rogue website that appears to be and looks like the real amazon.co.uk site.
The connection to the rogue server is still using https and displays a padlock icon but the attacker will have access to your data.
You can ensure that you are on the correct web page by examining the servers Secure Socket Layer (SSL) Certificate the genuine version of which can only be displayed by the real amazon.co.uk web-server.
Follow these simple steps. The Firefox browser is used here, but all browsers will allow you to view the certificate of a connection using https:
Type amazon.co.uk in to your browers location bar
Your browser will connect to the web-server provided by the DNS and display a padlock icon. Notes in grey, Firefox has added https://www to the address you typed. Its in grey to clearly show what has been added.
Click on the padlock icon
Click ‘More Information’
Click ‘View Certificate’
The SSL certificate will open. Check that the web address against Common Name (CN) is the same as the address in the location bar in the browser. If it is, you are connected to the real amazon.co.uk website with a secure https connection and your data is safe.
If the Common Name (CN) displayed differs in any way to what is in the location bar on your browser, there is a problem and you should not trust the website.
NB – The Common Name (CN) entry on the certificate only needs to match the domain of the website you have visited.
Whenever an email is sent, information is transmitted with that email and the route the email takes across a network is recorded. This information is known as the ‘Extended Header’.
The extended header can be of great use to the researcher and when used correctly, provides an insight into the sender, their software and hardware and potential recipients.
The extended header information potentially includes the senders IP address, email client, return address and the route the email has taken to reach its destination. This is useful in identifying and investigating ‘spoof’ or ‘phishing’ emails.
There are three main issues to discuss here before we move on.
The first is that different email services provide different information in the extended header.
The second is that we need to be in possession of original email, not one that has been forwarded to us for examination. A forwarded email will contain extended header information of the forwarder, not of the original email. The subject email can in some circumstances be sent as an attachment and in this case the extender header information will be retained.
The third is that different email clients / web based services present the extended header in different formats and the information is accessed in different ways. A Google search will reveal how to view the extended header information in your email client or web based service.
For our example, we are going to use an email sent from Microsoft Outlook 2013 to a gmail.com address.
We will be viewing the extended header of the email thorough the web based gmail service, but similar procedures apply to all email clients and services.
Below are the details of the email as it was sent from the Outlook 2013 account. We can see details of the recipient, the CC recipient, the BCC recipient, the email subject and the details of the attachment.
So, heres how to view the extended header information in the gmail web service:
Click the drop-down arrow to the right of the reply button
Click on ‘Show Original’ in the menu that has appeared
The extended header information for that email will open in a new window
Select all of the text that appears and copy it to your clipboard
Open either Word, Notepad or a similar text editor and paste in the extended email header. You can examine the header in its web page but I find it easier in an editor
For the extended header information used in this example , click on the icon below. It should open in a new tab.
This example has the relevant sections highlighted. The red numbers on the highlighted section do not form part of the header and have been appended for reference only.
To examine an Extended Email Header, we should read from the bottom up.
So, working upwards, here are the details:
1. The text content of the email
2.‘Disposition-Notification-To’ means that the sender has asked for a delivery or read receipt form the recipient. This receipt is often sent automatically when the recipient receives or opens the message, but this option can usually be modified in the recipients email program or client giving the recipient the option whether to send a receipt or not.
3. X-Mailer is the email client used by the sender. A Google search for ‘Microsoft Outlook 15.0’ identifies the client in this case as Microsoft Outlook 2013, so the sender must be running Windows.
3A. Message ID is the unique ID refernence of this message. It may be generated by the mail server or the ISP, but is unique and essential when speaking with administrators to trace a message and related information on a server or network.
4. The day, date and time sent from the senders machine. In this case its GMT +0100 as it is summer. Look closely, further up the header (below item 10) and you will see the server time (kundenserver.de) is GMT +0200 as that is the local time.
5. The subject line of the original email
6. The ‘CC’ or Carbon Copy recipients email address (jhellis@hotmail.co.uk).
NOTE: the ‘BCC’ or Blind Carbon Copy recipients name or email address (jellis@gmx.com) is not shown in the header.
7. The main recipients email address
8. The email address from which the original email was sent.
9. The reply to address (info@onlineops.co.uk) which is different to the senders email address. When the recipient replies to the email, this is the email address the reply is sent to. In this case this is the original senders email address, but could be an alternative email address. This is often the case in ‘scam’ emails.
10. This is the hostname of the computer used by the sender (jonmbp)and the senders public facing Internet Protocol (IP) address. In this case this IP address 87.117.199.182 when investigated (type it in to centralops.net) appears to be owned by Rapidswitch Limited in the UK.
Reading upwards, the first IP address that appears is usually that of the sender.
NOTE: not all email service providers capture the senders IP address in the Extended Header.
11. This entry confirms that the email was delivered to mrjhellis70@gmail.com and this is the recipients email address that this header relates to. This would be different if we where to examine the header of the other recipients email addresses.
The time and date of delivery to the server are shown. In this case the time is followed by the letters PDT which refer to ‘Pacific Daylight Time) and -0700 which means the time displayed is PDT minus 7 hours. This is not the time the email was read by the recipient.
Take particular care when interpreting times in Headers as they are specific to the location of the mail servers.
Try cut and pasting an email header in to the service at mxtoolbox.comThis services help breakdown the route and email has taken to reach its destination.
For help finding the Extended Email Header in your particular service or client, check out Header Help
As can be seen from the above example, Extended Email Headers provide a wealth of information about the originator and the content of an email, its path and recipients.
Exif stands for Exchangeable Image File and is sometimes called Metadata, a term which actually refers to the tags of information stored in the Exif data. The correct designation is Exif not EXIF.
Exif data is only available in images in .jpg or .tif format images. Whenever an image is captured in one of these formats using a digital device, Exif data is generally embedded into the image as a series of tags. These tags are viewable by other devices as they are in a common format.
Exif data tags can include date and time of image capture, last image modification, image capture device make and model, image capture information including flash activation, a thumbnail of the image, copyright information and GPS location data.
Be aware, though, that Exif data can be edited at any-time after the image has been captured, using software such as
Exif data is usually transmitted with the image when you transfer it from the original device by saving it to a memory card, sending by email, publishing on a webpage or backing up to cloud storage. Some messaging applications do not transmit the exif data with the image, such as iMessage on Apple devices.
Many web services such as Facebook and Twitter remove the Exif data from images before the image is published on the service. A notable exception to this trend is Flickr, which retains Exif data and is viewable by users.
Exif data can easily be removed from an image using free software such as
There are several methods available to the researcher for viewing Exif data in an image and some of these are outlined below.
It should be noted however that when examining an image in an investigation, a working copy of the image should be created and examined, with the original being preserved in its original format for evidential integrity purposes.
Search for ‘Exif Viewer 2.00’ and install this add-on
Restart Firefox and open a new tab
Drag and drop your image into the main body of the browser from its location
Right click on the image in the browser and select ‘View Image EXIF Data’ from the context menu
When the Exif data window opens, scroll through the information. This information can be copied to your clipboard
You will see GPS data towards the bottom of the information- click on one of the mapping links e.g. Google Maps
The map will open in a new window. Consider using Google Street View or Google Earth functions at this point
When you have completed your examination, close all open tabs and windows etc.
EXAMINING A WEB IMAGE USING FIREFOX WEB BROWSER
As above – but instead of dragging the image into the Firefox browser open the webpage and right click on the image of interest in the webpage. Try this with the images at
and install an extension (add-on) called Exif Viewer 2.33 by Andry Virvich.
This places a small camera icon at the bottom right of any image containing Exif data.
Click on the camera icon to view the data.
EXAMINING AN IMAGE USING A WEB BASED TOOL
Web based tools allow you to upload an image from your device and provide you with a detailed analysis of the Exif Data, including GPS mapping. They can be accessed from any browser on any operating system
There are several applications that can be installed on mobile devices to examine Exif and GPS data in images. Koredoko is one that I have tested and it works well. Its available on iOS and Android platforms and is free. Check out the developers website here and download the App from you store :