Back to Blog

OSINT: Mastering Email Address Investigation

(Updated: February 26, 2025)
Cybersecurity prerequisites

Table of Contents

Email addresses are more than just a means of communication—they are digital fingerprints that can unlock a wealth of information in Open Source Intelligence (OSINT) investigations. Whether you're tracking a phishing campaign, identifying impersonators, or mapping an organization's structure, email addresses serve as a critical starting point. This article dives into advanced techniques for dissecting email addresses, from analyzing their structure to tracing their origins and uncovering their connections across the digital landscape. By mastering these methods, cybersecurity professionals, investigators, and threat analysts can enhance their ability to protect systems, identify threats, and gather actionable intelligence.


Email Format and Structure Analysis

Decoding Email Naming Conventions

Email addresses often follow predictable patterns based on an organization's naming conventions. By reverse-engineering these patterns, investigators can predict valid email addresses and identify potential targets.

  • Common Patterns:

    • firstname.lastname@company.com
    • firstinitiallastname@company.com (e.g., jdoe@company.com)
    • firstname_lastname@company.com
    • firstname@company.com
    • Role-based addresses like admin@company.com or support@company.com.
  • How to Use This:

    • Collect known email addresses from the target organization (e.g., through LinkedIn or company websites).
    • Use tools like Hunter.io or Phonebook.cz to identify patterns.
    • Test variations to discover additional valid addresses.
  • Example:

    • If john.doe@company.com exists, test jane.doe@company.com or jdoe@company.com.
  • Why It Matters:

    • Predict emails for high-value targets like executives or IT admins, who are often targeted in phishing campaigns.

Domain-Based Email Discovery

Beyond individual emails, investigators can uncover all email addresses associated with a domain. This is particularly useful for mapping an organization's structure or identifying potential attack vectors.

  • Techniques:

    • Use tools like theHarvester to enumerate emails from a domain.
    • Leverage Google Dorks: site:company.com "@company.com".
  • Example:

    • Searching site:company.com "@company.com" may reveal publicly listed emails on the company’s website.
  • Caution:

    • Excessive enumeration can trigger security alerts. Use rate-limiting and ethical guidelines.

We wrote a comprehensive guide on Domain Intelligence Gathering that you might want to check for deeper insights.


Email Verification: Ensuring Authenticity

Passive Verification Techniques

Passive verification methods allow investigators to validate email addresses without directly interacting with the target’s servers.

  • 2.1.1 MX Record Analysis:

    • MX (Mail Exchange) records indicate which servers handle email for a domain.
    • Use tools like MXToolbox to view MX records.
    • Example: company.com mail handled by 10 mx1.company.com.
  • 2.1.2 SPF/DKIM/DMARC Checks:

    • SPF (Sender Policy Framework): Verifies if the sender’s IP is authorized.
    • DKIM (DomainKeys Identified Mail): Ensures email integrity using cryptographic signatures.
    • DMARC (Domain-based Message Authentication, Reporting, and Conformance): Combines SPF and DKIM to prevent spoofing.
    • Use tools like MXToolbox or DMARC Analyzer to check these records.
  • 2.1.3 Email Permutation and Generation:

Active Verification Methods (Use with Caution)

Active verification involves directly querying the email server to check if an address exists.

  • How It Works:

    • Tools like EmailHippo or ZeroBounce send SMTP requests to verify email validity.
    • Example: Sending a test email to check for bouncebacks.
  • Risks:

    • Active verification can trigger security alerts. Use sparingly and ethically.

Identifying Red Flags

Certain email characteristics can indicate potential risks:

  • Disposable Domains:
    • Domains like @tempmail.com or @mailinator.com are often used for temporary or malicious purposes.
  • Role-Based Accounts:
    • Addresses like admin@ or support@ are tied to shared mailboxes and may lack personal accountability.

Deep Dive into Email Header Analysis

Understanding Email Header Structure

Email headers contain metadata that reveals the email’s origin, path, and authenticity.

  • How to View Headers:

    • In Gmail: Click the three dots > "Show original."
    • In Outlook: Double-click the email > "File" > "Properties."
  • Key Fields:

    • Received: Shows the email’s path from sender to recipient.
    • Return-Path: The bounce address (often reveals the sender’s true server).
    • X-Originating-IP: The sender’s IP address.
    • Message-ID: A unique identifier for the email.

Analyzing Received Header Chains

The Received headers trace the email’s journey from sender to recipient.

  • How to Read Them:

    • Start from the bottom (oldest) to the top (most recent).
    • Look for inconsistencies in timestamps or IP addresses, which may indicate spoofing.
  • Example:

    Received: from malicious-server.example (192.168.1.1) by gmail.com
    

    This exposes the originating IP, which can be cross-referenced with threat intelligence platforms like VirusTotal.

Utilizing Header Analysis Tools

  • Google Messageheader Analyzer: Paste raw headers for a detailed breakdown.
  • MxToolbox Header Analyzer: Provides a user-friendly interface for header analysis.

Breached Credential Discovery

Checking for Data Breaches

Breached credentials can reveal compromised accounts and inform remediation strategies.

  • Tools:

  • Example:

    • Searching ceo@company.com on HaveIBeenPwned reveals if the email was exposed in past breaches.

Ethical Use of Breach Data

  • Responsible Disclosure:
    • Notify affected users and enforce password resets.
  • Avoid Exploitation:
    • Never use breached credentials for unauthorized access.

Advanced Social Media Correlation

Reverse Email Lookups on Social Platforms

Username Permutations and Cross-Platform Analysis

  • Techniques:
    • Identify username patterns across platforms.
    • Use reverse image search on profile pictures to find other accounts.

Ethical Considerations and Legal Compliance

  • Legal Compliance: Adhere to privacy laws like GDPR.
  • Transparency: Disclose your intent when contacting individuals.
  • Avoid Doxxing: Never aggregate personal info beyond investigative needs.

Real-World Case Study: Phishing Email Investigation

  • Scenario: Investigating a phishing email sent to ceo@example.com.
  • Steps:
    1. Header Analysis: Extract the sender’s IP and geolocate it.
    2. Breach Check: Confirm if ceo@example.com was leaked in past breaches.
    3. Format Analysis: Identify other high-value targets (e.g., cfo@example.com).
    4. Social Search: Find LinkedIn profiles linked to the attacker’s email.

Conclusion

Mastering email address investigation requires a combination of technical skills, ethical responsibility, and continuous learning. By leveraging these advanced OSINT techniques, you can uncover critical insights, protect against threats, and enhance your investigative capabilities. Start small, stay curious, and always prioritize privacy and legality.

This article is part of a series on OSINT techniques. Check out our Top 10 OSINT Techniques Every Cybersecurity Professional Should Know guide for more insights.

Test Your Knowledge

Ready to apply what you've learned? Take a quiz and test your understanding of these concepts.

Take a Quiz