Difference between revisions of "Windows Desktop Search"

From ForensicsWiki
Jump to: navigation, search
(Initial stub)
 
(External Links)
(22 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{Expand}}
 
{{Expand}}
  
== See Also ==
+
Windows Desktop Search (or Windows Search) is a 'desktop' indexer for Microsoft Windows.
 +
In Windows XP, Search 4.0 (or Search XP) was an add-on. However Microsoft integrated Search into Windows Vista as 'part of the package'.
  
[[Google Desktop Search]]
+
 
 +
== Data location ==
 +
Windows Search stores its data in:
 +
 
 +
<pre>
 +
%Profiles%\All Users\Application Data\Microsoft\Search\Data\Applications\Windows\
 +
</pre>
 +
 
 +
Note that '%Profiles%' is dependent on the [[Windows]] version.
 +
 
 +
The search index is stored in a file named '''Windows.edb'''. This file is an [[Extensible_Storage_Engine_(ESE)_Database_File_(EDB)_format | Extensible Storage Engine Database (EDB)]].
 +
 
 +
To access the Windows.edb file (on a live system) the the Windows Search service needs to be deactivated and the necessary access rights are required.
 +
 
 +
== Analysis ==
 +
Currently there are not many [[Windows Desktop Search#Tools|tools]] which allow you to 'forensically' analyze the Windows Search database.
 +
 
 +
=== Artifacts ===
 +
The artifacts in the Windows Search database can be useful in forensic analysis of a desktop Windows system, especially Windows Vista and later.
 +
A few applications are:
 +
* to (partial) recover the content of indexed documents and even email messages stored on a Microsoft Exchange server
 +
* to indicate the former existence of files
 +
* time-line analysis
 +
 
 +
=== Dirty database ===
 +
When analyzing Windows Search databases you can come across a 'dirty database'. This is one left in a dirty state.
 +
Some of the tools fail to open these databases. You might have to resort to repairing the database or use a tools that does not have such limitations.
 +
 
 +
=== Obfuscation and compression ===
 +
Windows Search uses both obfuscation and compression to store some of its data, but according to 'Forensic analysis of the Windows Search database' this is easily circumvented.
 +
 
 +
== See Also ==
 +
* [[Google Desktop Search]]
 +
* [[Extensible_Storage_Engine_(ESE)_Database_File_(EDB)_format | Windows.edb file format]]
  
 
== External Links ==
 
== External Links ==
Line 10: Line 44:
 
* [http://en.wikipedia.org/wiki/Windows_Desktop_Search Wikipedia entry on Windows Desktop Search]
 
* [http://en.wikipedia.org/wiki/Windows_Desktop_Search Wikipedia entry on Windows Desktop Search]
 
* [http://en.wikipedia.org/wiki/List_of_search_engines#Desktop_search_engines Wikipedia list of Desktop search engines]
 
* [http://en.wikipedia.org/wiki/List_of_search_engines#Desktop_search_engines Wikipedia list of Desktop search engines]
 +
* [http://code.google.com/p/libesedb/downloads/detail?name=Forensic%20analysis%20of%20the%20Windows%20Search%20database.pdf Forensic analysis of the Windows Search database]
 +
 +
== Tools ==
 +
* [http://www.woany.co.uk/esedbviewer/ EseDBViewer]
 +
* [[libesedb]]
 +
* [http://www.lostpassword.com/search-index-examiner.htm Windows Search Index Examiner]
 +
 +
[[Category:Desktop Search]]

Revision as of 01:09, 26 August 2012

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Windows Desktop Search (or Windows Search) is a 'desktop' indexer for Microsoft Windows. In Windows XP, Search 4.0 (or Search XP) was an add-on. However Microsoft integrated Search into Windows Vista as 'part of the package'.


Data location

Windows Search stores its data in:

%Profiles%\All Users\Application Data\Microsoft\Search\Data\Applications\Windows\

Note that '%Profiles%' is dependent on the Windows version.

The search index is stored in a file named Windows.edb. This file is an Extensible Storage Engine Database (EDB).

To access the Windows.edb file (on a live system) the the Windows Search service needs to be deactivated and the necessary access rights are required.

Analysis

Currently there are not many tools which allow you to 'forensically' analyze the Windows Search database.

Artifacts

The artifacts in the Windows Search database can be useful in forensic analysis of a desktop Windows system, especially Windows Vista and later. A few applications are:

  • to (partial) recover the content of indexed documents and even email messages stored on a Microsoft Exchange server
  • to indicate the former existence of files
  • time-line analysis

Dirty database

When analyzing Windows Search databases you can come across a 'dirty database'. This is one left in a dirty state. Some of the tools fail to open these databases. You might have to resort to repairing the database or use a tools that does not have such limitations.

Obfuscation and compression

Windows Search uses both obfuscation and compression to store some of its data, but according to 'Forensic analysis of the Windows Search database' this is easily circumvented.

See Also

External Links

Tools