SlideShare a Scribd company logo
Explore Outlook PST Data File!!
What is PST File?
 A PST file is a personal folder file in Microsoft Outlook.
 PST is an acronym for Personal Storage Table with the
file extension of “.pst”.
 In Outlook, the storage limit for a single user's .pst file is
2 GB till version 2002.
 PST file can also be used for archiving items from any
email account type via configuration.
 A POP3 type of email account — uses Outlook Data
Files (.pst).
 When Outlook items are saved in an Outlook Data File
(.pst), the items are available only on the local machine.
PST File – Quick Highlights
1. PST File does its programming tasks by using Outlook
Primary Interop Assemblies. These are a set of .NET
classes that provide a complete object model for
working with Microsoft Outlook.
2. Most .pst files use Unicode text, but some older
versions of Outlook create ANSI-based .pst files.
3. The PST file can be encrypted with a password to
protect the confidential information in it.
What's Oversized PST File Problem?
• Microsoft Outlook 2002 and earlier versions limit
the size of (PST) file to 2GB.
• Whenever the PST file reaches or exceeds that
limit, you will not be able to open or load it any
more, this is called oversized PST file problem.
• Microsoft Outlook 2003 put an end to this problem.
PST file created in it supports Unicode formatting
thus, doesn't have the 2GB size limit any more.
Structure Overview of PST
Messaging Layer
(msg store, folders, message, attachment)
List Table Layer
( Heap, BTree, Property Bags, Tables)
Node Database Layer
(Node database and Basic Storage)
 Logical Structure of PST File
 The Messaging layer has the logic to combine the
other two layers into folders, messages, attachments,
and properties.
 The Properties (LTP) layer is concerned primarily with
properties, which it stores in two-dimensional tables.
 The NDB layer includes the header, file allocation
information, and the nodes and blocks that hold
the message data, plus nodes that help locate that
data.
 Physical Structure of PST File
 Header
 Reserved Data
 Density List
 Allocation Map
 Page Map
 Data Section
 Free Map
 Free Page Maps
Header Structure:
It resides at the starting of the file & contains
information regarding-
 Metadata.
 Root record.
 Initial free map (FMap).
 Free page map (FPMap).
Reserved Data:
 Octets are reserved between the end of the header and
the beginning of the Density List(DLIst).
 This part is reserved for future expansion of the PST file
Header structure.
Density List (DList):
 Consists of an ordered list of references to (AMap).
 Optimize the space allocation so that space referred to
pages with the most abundant free space is allocated
first.
 One DList in the PST, which is always located at a fixed
offset in the PST file.
Allocation Map (AMap):
 It tracks the allocation status of the data
section that follows the AMap page in the file.
 Here user can view the complete AMap page
as an array of bits, where each bit corresponds
to the allocation state of 64-bytes of data.
 An AMap page appears approximately after
every 250 KB in the .pst file.
Page Map(PMap):
 Block of data that is 512 byte in size.
 It generally stores metadata in the PST.
 Optimizes the search of available page.
 PMap roughly appears after every 2 megabytes.
Data Section:
Group of Data that is 250 Kbytes contains allocation.
Each allocation have align of 64-byte boundary and is in
size that are multiples of 64 bytes.
Free Map(FMap):
 Provides a mechanism to quickly locate contiguous free
space.
 Each byte in the FMap corresponds to one AMap page.
 FMap contains the maximum amount of contiguous free
space in that AMap up to about 16 kilobytes.
Free Page Map(FPMap):
 It is used to quickly find free pages.
 FPMap page covers about 8 gigabytes of space.
Vital Role of PST File in Digital Forensics
 With the increase in e-mail scams and fraud attempts
with phishing and spoofing:
• Investigators need to know how to examine and carve
evidence from e-mail message.
• Examine evidence from emails is the motive to
introduce a whole new range of analysis solutions in
"Digital Forensic"
• Since Outlook Data file are in .pst file format, here
investigators use some renowned tool to examine
such files.
 If you want more info for the same just go through the
given link:
http://www.xploreforensics.com/pst-file-forensics.html
Outlook PST Files Serving Role of Outlook Data Files

More Related Content

What's hot

Data storage and indexing
Data storage and indexingData storage and indexing
Data storage and indexing
pradeepa velmurugan
 
Lecture #1 Introduction
Lecture #1 IntroductionLecture #1 Introduction
Lecture #1 IntroductionRico
 
New in Hadoop: You should know the Various File Format in Hadoop.
New in Hadoop: You should know the Various File Format in Hadoop.New in Hadoop: You should know the Various File Format in Hadoop.
New in Hadoop: You should know the Various File Format in Hadoop.
veeracynixit
 
Introduction to the design and specification of file structures
Introduction to the design and specification of file structuresIntroduction to the design and specification of file structures
Introduction to the design and specification of file structures
Devyani Vaidya
 
indexing and hashing
indexing and hashingindexing and hashing
indexing and hashing
University of Potsdam
 
Url and protocol
Url and protocolUrl and protocol
Url and protocol
Waheed Iqbal Boss
 
Unit 3 chapter-1managing-files-of-records
Unit 3 chapter-1managing-files-of-recordsUnit 3 chapter-1managing-files-of-records
Unit 3 chapter-1managing-files-of-records
hanumanthu mothukuru
 
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter TreesExpediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
David Lillis
 
File Organization in Database
File Organization in DatabaseFile Organization in Database
File Organization in Database
A. S. M. Shafi
 
Indexing and hashing
Indexing and hashingIndexing and hashing
Indexing and hashingJeet Poria
 
Sample database design methodology
Sample database design methodologySample database design methodology
Sample database design methodology
Wally Pons
 
Csc4320 chapter 8 2
Csc4320 chapter 8 2Csc4320 chapter 8 2
Csc4320 chapter 8 2
bshikhar13
 
Indexing and-hashing
Indexing and-hashingIndexing and-hashing
Indexing and-hashingAmi Ranjit
 
Lec 1 indexing and hashing
Lec 1 indexing and hashing Lec 1 indexing and hashing
Lec 1 indexing and hashing
Md. Mashiur Rahman
 
Exchange Server Recovery
Exchange Server RecoveryExchange Server Recovery
Exchange Server Recovery
martin09miller
 
12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMSkoolkampus
 

What's hot (19)

Data storage and indexing
Data storage and indexingData storage and indexing
Data storage and indexing
 
Lecture #1 Introduction
Lecture #1 IntroductionLecture #1 Introduction
Lecture #1 Introduction
 
New in Hadoop: You should know the Various File Format in Hadoop.
New in Hadoop: You should know the Various File Format in Hadoop.New in Hadoop: You should know the Various File Format in Hadoop.
New in Hadoop: You should know the Various File Format in Hadoop.
 
File organization
File organizationFile organization
File organization
 
Introduction to the design and specification of file structures
Introduction to the design and specification of file structuresIntroduction to the design and specification of file structures
Introduction to the design and specification of file structures
 
indexing and hashing
indexing and hashingindexing and hashing
indexing and hashing
 
Url and protocol
Url and protocolUrl and protocol
Url and protocol
 
Unit 3 chapter-1managing-files-of-records
Unit 3 chapter-1managing-files-of-recordsUnit 3 chapter-1managing-files-of-records
Unit 3 chapter-1managing-files-of-records
 
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter TreesExpediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
 
File Organization in Database
File Organization in DatabaseFile Organization in Database
File Organization in Database
 
Indexing and hashing
Indexing and hashingIndexing and hashing
Indexing and hashing
 
Sample database design methodology
Sample database design methodologySample database design methodology
Sample database design methodology
 
Csc4320 chapter 8 2
Csc4320 chapter 8 2Csc4320 chapter 8 2
Csc4320 chapter 8 2
 
Indexing and-hashing
Indexing and-hashingIndexing and-hashing
Indexing and-hashing
 
Lec 1 indexing and hashing
Lec 1 indexing and hashing Lec 1 indexing and hashing
Lec 1 indexing and hashing
 
Unit08 dbms
Unit08 dbmsUnit08 dbms
Unit08 dbms
 
Exchange Server Recovery
Exchange Server RecoveryExchange Server Recovery
Exchange Server Recovery
 
12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS
 
Indexing
IndexingIndexing
Indexing
 

Similar to Outlook PST Files Serving Role of Outlook Data Files

Repair 2 gb pst
Repair 2 gb pstRepair 2 gb pst
Repair 2 gb pstkate soar
 
Outlook pst repair
Outlook pst repairOutlook pst repair
Outlook pst repairJane Parker
 
Write intensive workloads and lsm trees
Write intensive workloads and lsm treesWrite intensive workloads and lsm trees
Write intensive workloads and lsm trees
Tilak Patidar
 
File system
File systemFile system
File system
Harleen Johal
 
Filepointers1 1215104829397318-9
Filepointers1 1215104829397318-9Filepointers1 1215104829397318-9
Filepointers1 1215104829397318-9
AbdulghafarStanikzai
 
File Handling In C++(OOPs))
File Handling In C++(OOPs))File Handling In C++(OOPs))
File Handling In C++(OOPs))
Papu Kumar
 
Email Analysis
Email AnalysisEmail Analysis
Email Analysis
primeteacher32
 
Fat File Systems
Fat File SystemsFat File Systems
Fat File Systems
ArthyR3
 
Alternate Data Streams
Alternate Data StreamsAlternate Data Streams
Alternate Data Streamsnephijohnson
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tables
shashikant pabari
 
Chapter 08 data file handling
Chapter 08 data file handlingChapter 08 data file handling
Chapter 08 data file handling
Praveen M Jigajinni
 
Bba203 unit 2data processing concepts
Bba203   unit 2data processing conceptsBba203   unit 2data processing concepts
Bba203 unit 2data processing concepts
kinjal patel
 
Computer lesson 7 files & folders
Computer lesson 7   files & foldersComputer lesson 7   files & folders
Computer lesson 7 files & folderscocon5
 
Computer lesson 7 files & folders
Computer lesson 7   files & foldersComputer lesson 7   files & folders
Computer lesson 7 files & foldersallsaintstech
 
Advfs 2 ondisk Structures
Advfs 2 ondisk StructuresAdvfs 2 ondisk Structures
Advfs 2 ondisk Structures
Justin Goldberg
 

Similar to Outlook PST Files Serving Role of Outlook Data Files (20)

Repair 2 gb pst
Repair 2 gb pstRepair 2 gb pst
Repair 2 gb pst
 
Outlook pst repair
Outlook pst repairOutlook pst repair
Outlook pst repair
 
Write intensive workloads and lsm trees
Write intensive workloads and lsm treesWrite intensive workloads and lsm trees
Write intensive workloads and lsm trees
 
File system
File systemFile system
File system
 
File system
File systemFile system
File system
 
Filepointers1 1215104829397318-9
Filepointers1 1215104829397318-9Filepointers1 1215104829397318-9
Filepointers1 1215104829397318-9
 
File Handling In C++(OOPs))
File Handling In C++(OOPs))File Handling In C++(OOPs))
File Handling In C++(OOPs))
 
Email Analysis
Email AnalysisEmail Analysis
Email Analysis
 
Fat File Systems
Fat File SystemsFat File Systems
Fat File Systems
 
Alternate Data Streams
Alternate Data StreamsAlternate Data Streams
Alternate Data Streams
 
Windows xp
Windows xpWindows xp
Windows xp
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tables
 
04 Cache Memory
04  Cache  Memory04  Cache  Memory
04 Cache Memory
 
Chapter 08 data file handling
Chapter 08 data file handlingChapter 08 data file handling
Chapter 08 data file handling
 
File Handling in C++
File Handling in C++File Handling in C++
File Handling in C++
 
Files
FilesFiles
Files
 
Bba203 unit 2data processing concepts
Bba203   unit 2data processing conceptsBba203   unit 2data processing concepts
Bba203 unit 2data processing concepts
 
Computer lesson 7 files & folders
Computer lesson 7   files & foldersComputer lesson 7   files & folders
Computer lesson 7 files & folders
 
Computer lesson 7 files & folders
Computer lesson 7   files & foldersComputer lesson 7   files & folders
Computer lesson 7 files & folders
 
Advfs 2 ondisk Structures
Advfs 2 ondisk StructuresAdvfs 2 ondisk Structures
Advfs 2 ondisk Structures
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Outlook PST Files Serving Role of Outlook Data Files

  • 1. Explore Outlook PST Data File!!
  • 2. What is PST File?  A PST file is a personal folder file in Microsoft Outlook.  PST is an acronym for Personal Storage Table with the file extension of “.pst”.  In Outlook, the storage limit for a single user's .pst file is 2 GB till version 2002.  PST file can also be used for archiving items from any email account type via configuration.  A POP3 type of email account — uses Outlook Data Files (.pst).  When Outlook items are saved in an Outlook Data File (.pst), the items are available only on the local machine.
  • 3. PST File – Quick Highlights 1. PST File does its programming tasks by using Outlook Primary Interop Assemblies. These are a set of .NET classes that provide a complete object model for working with Microsoft Outlook. 2. Most .pst files use Unicode text, but some older versions of Outlook create ANSI-based .pst files. 3. The PST file can be encrypted with a password to protect the confidential information in it.
  • 4. What's Oversized PST File Problem? • Microsoft Outlook 2002 and earlier versions limit the size of (PST) file to 2GB. • Whenever the PST file reaches or exceeds that limit, you will not be able to open or load it any more, this is called oversized PST file problem. • Microsoft Outlook 2003 put an end to this problem. PST file created in it supports Unicode formatting thus, doesn't have the 2GB size limit any more.
  • 5. Structure Overview of PST Messaging Layer (msg store, folders, message, attachment) List Table Layer ( Heap, BTree, Property Bags, Tables) Node Database Layer (Node database and Basic Storage)  Logical Structure of PST File
  • 6.  The Messaging layer has the logic to combine the other two layers into folders, messages, attachments, and properties.  The Properties (LTP) layer is concerned primarily with properties, which it stores in two-dimensional tables.  The NDB layer includes the header, file allocation information, and the nodes and blocks that hold the message data, plus nodes that help locate that data.
  • 7.  Physical Structure of PST File  Header  Reserved Data  Density List  Allocation Map  Page Map  Data Section  Free Map  Free Page Maps
  • 8. Header Structure: It resides at the starting of the file & contains information regarding-  Metadata.  Root record.  Initial free map (FMap).  Free page map (FPMap).
  • 9. Reserved Data:  Octets are reserved between the end of the header and the beginning of the Density List(DLIst).  This part is reserved for future expansion of the PST file Header structure. Density List (DList):  Consists of an ordered list of references to (AMap).  Optimize the space allocation so that space referred to pages with the most abundant free space is allocated first.  One DList in the PST, which is always located at a fixed offset in the PST file.
  • 10. Allocation Map (AMap):  It tracks the allocation status of the data section that follows the AMap page in the file.  Here user can view the complete AMap page as an array of bits, where each bit corresponds to the allocation state of 64-bytes of data.  An AMap page appears approximately after every 250 KB in the .pst file.
  • 11. Page Map(PMap):  Block of data that is 512 byte in size.  It generally stores metadata in the PST.  Optimizes the search of available page.  PMap roughly appears after every 2 megabytes. Data Section: Group of Data that is 250 Kbytes contains allocation. Each allocation have align of 64-byte boundary and is in size that are multiples of 64 bytes.
  • 12. Free Map(FMap):  Provides a mechanism to quickly locate contiguous free space.  Each byte in the FMap corresponds to one AMap page.  FMap contains the maximum amount of contiguous free space in that AMap up to about 16 kilobytes. Free Page Map(FPMap):  It is used to quickly find free pages.  FPMap page covers about 8 gigabytes of space.
  • 13. Vital Role of PST File in Digital Forensics  With the increase in e-mail scams and fraud attempts with phishing and spoofing: • Investigators need to know how to examine and carve evidence from e-mail message. • Examine evidence from emails is the motive to introduce a whole new range of analysis solutions in "Digital Forensic" • Since Outlook Data file are in .pst file format, here investigators use some renowned tool to examine such files.  If you want more info for the same just go through the given link: http://www.xploreforensics.com/pst-file-forensics.html