Commonly organizations ask their users to forward phishing emails as .eml attachments to a phishing inbox. This technique shows how to read an email, any attachments, and any attachments that are also .eml files.