

The outlook PST files reside in %AppData%\Local\Microsoft\Outlook location on the drive. So is it possible to extract the evidence from the PST file after hard deletion?

But if the malicious insider has performed “hard deletion” by deleting the emails from the PST file permanently, this will result in the forensic investigation scope. This helps a user to retrieve all the deleted messages with the use of the “Deleted Item” folder. The complete set of emails of a specific user gets saved in PST format(personal storage table)/Data file. Microsoft Outlook provides the capability to store all its email messages and attachments as a record in an encoded or compact format. Now that we have understood some basic components of an email, let’s get into the forensics part. text = “globalsign-smime-dv=CDYX+XFHUw2wml6/Gb8+59BsH31KzUr6c1l2BPvqKX8=”ĭomain keys identified mail (DKIM): Domain keys identified mail provides a cryptographic method of verifying a received email, if it originated from the sending domain or not. text =”facebook-domain-verification=22rm551cu4k0ab0bxsw536tlds4h95″ You can use the below command to find the SPF record for any website. If an email fails in SPF check it can be detected as spam. The information is published in the DNS as a txt record. Sender Policy Framework (SPF): Sender policy framework can be used by an organization to specify a server or a list of servers to send or receive the email on behalf of the domain. Use of IMAP over POP3 enables the message to be on the server so that the mailbox can be consistent across multiple devices.

MUA communicates with MTA using different protocols like IMAP & POP3 to download the messages intended for the receiver.

Example of MTA is postfix, Sendmail, Microsoft exchange etc. Mail Transfer Agent (MTA): Mail Transfer Agent accepts messages from a sender and routes it to the destination. Mail User Agent (MUA): Mail User Agent, is the mail user agent which is used as a client-side application running on a computer for sending and receiving emails. There are a lot of different providers who offer email clients eg: outlook, thunderbird etc.īefore getting into forensics, it’s worth understanding some of the basic components of an email. Hence email forensics plays a very important role in any cybercrime investigation. This medium of message exchange has been used the most by cybercriminals for manifesting different crimes. With every technology, there comes a risk. Emails are the most commonly used technology for exchanging messages between people/businesses using electronic media.
