Gonnella - 2 - Riddell - THE FORENSIC ARTIFACTS OF MICROSOFT ONENOTE - Aug 2012
Gonnella - 2 - Riddell - THE FORENSIC ARTIFACTS OF MICROSOFT ONENOTE - Aug 2012
Gonnella - 2 - Riddell - THE FORENSIC ARTIFACTS OF MICROSOFT ONENOTE - Aug 2012
Microsoft OneNote is a powerful data management tool. In the past it has been an
obscure component of the Microsoft Office suite. Today it is a cross platform PC, MAC,
mobile, and web based application that integrates with Microsoft SkyDrive. However,
there is no substantial research on the topic of OneNote forensics. This body of research
explores the forensic artifacts that may be recovered during investigations involving
Microsoft OneNote. The research explains the relevance of OneNote artifacts for today’s
OneNote and its files, and offers insight into the many artifacts that can be located for the
various installations and usage of OneNote. A hypothetical case scenario involving the
style examination demonstrates how OneNote could be exploited for criminal purposes
and how an examiner might proceed with the examination. The forensic artifacts of
OneNote’s structure, file header, internal paging and caching system, and its recycle bin
are all discussed and analyzed. This body of research will allow others to investigate
By
Cynthia Gonnella
Utica College
August 2012
Literature Review................................................................................................................ 3
Scenario............................................................................................................................... 5
Analysis............................................................................................................................... 6
Discussion ......................................................................................................................... 11
Conclusion ........................................................................................................................ 28
Bibliography ..................................................................................................................... 32
v
List of Illustrative Material
Figure 5. OneNote files located by file header in Guidance Software EnCase ................ 24
vi
Acknowledgement
forensics, I was ready for a challenge. I had spent years working cases in dead forensics
and was ready to take it to the next level. I am pleased to acknowledge Utica College for
selection process to the talented staff delivering the program, I always had assistance
when there were difficulties. Many family and job related situations arose that would
have made it nearly impossible to complete this program, had it not been for the
dedication of the Utica professors and their concern for my success. I would like to
acknowledge Professor Chris Riddell who has mentored me through the capstone process
and Professor Leonard Popyack who graciously served as my second, technical reader.
Both have provided professional and timely assistance as needed to ensure my successful
completion of the program. I must acknowledge my family who has sacrificed much
life, a family business, and a full-time traveling job instructing computer forensic classes
across the country. In fact, finishing what I started and validating my family’s precious
sacrifices, has been my main driving force to see this through. I am grateful for my
numerous mentors over the years who have helped shape my successful career in
computer forensics. I looked forward to the day, I too, could give something back to the
and crucial body of research. I am both pleased and excited to present the Forensic
Artifacts of Microsoft OneNote to the forensic community. My hope is that others will
pick up where I have left off and continue researching the forensic artifacts of OneNote.
vii
The Forensic Artifacts of Microsoft OneNote
The purpose of this research was to explore the forensic artifacts that may be
data management application that integrates with other Microsoft Office products and can
be run on a local machine or from the web without installation. This research explains the
for examiners to become familiar with OneNote and its files, and offers insight into the
many artifacts that can be located for the various installations and usage of OneNote.
This body of research will allow others to investigate OneNote artifacts and conduct
further research.
hardware and software. Increased usage of software applications such as OneNote, tips
them off to the types of files they can expect to see in future examinations. As the new
releases of OneNote applications become more popular, examiners know it will not be
long until requested to recover artifacts associated with OneNote files. While once an
obscure component of the Microsoft Office suite, today OneNote is gaining in popularity.
The newfound interest may be due to Microsoft’s releasing OneNote as a cross platform
app for desktop and mobile users alike. In June 2010, Microsoft released web apps, a
lighter version of its Office products, including OneNote. Web apps require users to
create a Windows Live account. Each live account provides the user seven gigabytes of
released a mobile app for OneNote, to the Apple market. In February 2012, the mobile
1
app was also released to the Android market. Packed with features that serve today’s
instant technology needs, users who have discovered its versatility and powerful data
organization abilities claim they would not part with it. Edwards and Edwards (2012), in
their blog posted a comment about how integrated OneNote has become in their lives,
“These days, I live and die by OneNote.” (para. 1) Some even call it Microsoft’s “best
kept secret.” Numoto (2011), the Corporate Vice President of Microsoft Office, called
optional component of Microsoft Office. Creative OneNote users have found several
ways to capitalize on its data organization and management capabilities. In fact, several
educational institutions, students, police officers and others have already put OneNote to
use organizing data, collaborating on projects, scheduling events, and managing case
information. Not all users will put OneNote to use for positive purposes. Crafty cyber
criminals will undoubtedly exploit the unique features of OneNote for nefarious
purposes.
Microsoft is reaching out to almost every user in the world, from PCs to Macs,
from iPhones to Androids and tablets in between, regardless of the platform or browser
scholarly resources and forensic manuals also yielded no substantial research on the topic
2
documentation prolongs the investigation while the examiner takes time to conduct new
research.
When examiners are presented with unfamiliar file types, they must determine the
origin and structure before understanding what artifacts may be collected. In some cases,
the learning curve is so extensive that it precludes a timely report of the findings.
OneNote app has become a part of all markets, examiners can expect to see an increase in
cases involving OneNote artifacts. This research serves as both an interim document for
examiners who encounter OneNote files and a catalyst for further research.
Literature Review
Though the research into the forensic artifacts is limited, OneNote’s developers and users
have published several resources that offer the forensic examiner a foundation on which
OneNote files. The information contained in this literature review is presented in three
sections; those who feel information is not flowing well enough in the forensic
community, an example of how OneNote could be used for nefarious purposes, and the
new data types and unfamiliar applications that are clearly relevant to the case at hand.
To complete a thorough analysis, the examiner must overcome the learning obstacle this
3
situation presents. Using investigative skills and forensic tools, the examiner often
overcomes the obstacle. A series of testing and validation produces a working knowledge
that can be applied to gather artifacts in the current case, and any similar cases in the
future. In April 2012, in an interview with Forensic Interviews, a web site dedicated to
computer forensic books, open source computer forensic books, and RegRipper forensic
software, expressed his feelings that analysts seldom document the forensic problem
solving process, depriving others in the forensic community of the lessons learned and
For some reason, analysts within the community seem to think that any problem
that they’ve encountered, no one else has ever seen, so they won’t ask for
assistance. When an exam is over, analysts take the opposite view and tend not
share their findings, thinking that everyone else has already seen what they’ve
seen and therefore wouldn’t be interested in their findings or thoughts. In the long
run, this reticence to engage with the community is going to have a significant,
detrimental impact on the community (“Yuri: Please give some predictions,” para.
1).
Carvey spoke about the lack of case notes available for examiners to educate
themselves from each other’s work. How then do examiners prepare themselves for the
types of situations they may face? Many examiners consider different scenarios and think
about how they would conduct an examination. A hypothetical, but realistic, scenario
often helps examiners understand how certain software could be used to facilitate a
crime. The following scenario leads in with the story of a manager who is accused of
4
leaking company secrets. A walk through of the forensic artifacts reveals how he used
OneNote as a means to sneak a file out without being noticed. Many computer crime
classes will use similar techniques to prepare examiners for the types of forensic
Scenario
The police department forensic unit was dispatched to the Rielitom Corporate
office. Rielitom is a small business operated from a single office location. The computer
users share information via file sharing over a simple Windows 7 home network. After
suffering a costly virus, all computers had been configured to prevent the usage of
removable media. The owner reported that an account manager and project team leader,
Tom Terces, was reportedly leaking company secrets. As an account manager, Tom
legitimately had access to all sensitive company files. He mainly used Microsoft Office
2010 to create and manage his team’s projects. Tom was computer savvy and had
unlimited use of the Internet from his work machine. He commonly used OneNote for
data management. Tom allowed his team members to access the public documents folder
he managed on his machine. All team members were regularly briefed on the sensitivity
of data and clicked through a banner when logging on to remind them company data was
never to be copied or disseminated in any way. One evening, a coworker observed Tom
sitting in a bar with an unknown male. Tom was revealing company secrets to him about
prototype P1-343, via a laptop computer. The coworker also overheard Tom complaining
to the man about his salary and how he was overworked. The coworker reported the
incident to the owner of the company, who immediately contacted the police. The
5
Only the coworker who reported the incident and the owner were aware of the
investigation. When questioned about the laptop and what was displayed on the screen,
the coworker said he remembered seeing OneNote open at the top of the screen, but it
looked like a different version than Tom used at work. The employee stated he did not
know the other party or who owned the laptop, but he did not think the laptop was Tom’s.
Using proper authority and forensic practices, a police forensic examiner acquired an
image of the local hard drive from Tom’s work PC and returned to the police department
Analysis
Analysis of this hard drive image should include a search for any unauthorized
copying of files or content related to prototype P1-343. The mere existence of related
files would not be evidentiary, as Tom had authority to access all company files. The
examiner would normally select a forensic suite to conduct the processing. In this study,
AccessData’s Forensic Toolkit (FTK), version 1.81.6, in demo mode (version 4.0 is
current), was chosen to examine a Windows 7 x86 virtual machine with Microsoft Office
2010 installed (AccessData, 2012). The image file was mounted in FTK Imager
3.0.1.1467 (AccessData, 2012). FTK was set to index the contents of the hard drive
image and to carve documents during its initial processing. The leaked prototype file was
expected to be located in the public documents directory. Parts of the prototype file were
also expected in the pagefile.sys where Windows swaps out memory to the hard drive for
efficiency while working with files (Casey, 2010, Loc. 6334). These areas were checked
and the expected items were found. Initially, nothing appeared out of the ordinary.
6
In this particular case however, several factors should lead the examiner to search
for artifacts specific to OneNote. First, the reporting employee saw OneNote was open
when Tom was showing secrets about prototype P1-343 to an acquaintance away from
the office. Second, OneNote is a program Tom uses, yet the employee did not believe
Tom was using his own laptop. Third, Tom could not copy the files to a thumb drive, as
the company network policy prevented it. Finally, Tom had full use of Microsoft Office
and unlimited Internet access, giving him opportunity to save data to a OneNote web
notebook from work. He could then easily share it with another party away from work.
instead of the cabinet, drawers, and folders, OneNote uses notebooks, sections, and
pages. New users can think of a notebook as a file cabinet, a section as a drawer, and a
page as an individual file folder in the drawer. The items on a page are like the loose
sheets or notes that are stuffed in the folder. In a physical filing system, sometimes notes
are written on the cover of the folder or on the inside of the folder. Pieces of paper and
“post-its” are tossed in the folder to keep related ideas and notes together in one place.
The file folder may even contain print outs of documents or a CD containing copies of
related electronic files. OneNote is an electronic version of this data management. Like a
file folder in the cabinet, but electronically, OneNote allows users to insert picture files,
print outs of files, screen clippings, audio and video recordings, ink pad writings, and
even copies of other files into a page within a section. Sections are stored as .one files.
If the examiner hypothesized that Tom inserted the prototype file into OneNote on
the local machine, verifying the hypothesis could be as simple as viewing the contents of
any .one files in the folder, OneNote Notebooks, under Tom’s Documents folder.
7
However in checking this location, (C:\Users\<username>\Documents\OneNote
Notebooks\), the folder contained no .one files. On the surface then, it appeared that Tom
did not create any OneNote notebooks. However, OneNote also stores data in AppData.
AppData is a system and hidden folder under the user profile’s home folder. By default,
as a safeguard to keep users from damaging the operating system, Windows is set not to
show system or hidden folders. Fortunately, FTK and other forensic tools display all files
and folders regardless of those settings. In the AppData folder, OneNote keeps backups
of .one files, performs caching of notebook data, and stores server information. OneNote
Figure 1 displays 8 search hit results obtained using FTK to search the entire OneNote
AppData folder in FTK, for the unique prototype name, “P1-343”, (Path searched:
C:\Users\<username>\AppData\Microsoft\OneNote\).
8
The entries in this file documented the user’s activities. The user created a new OneNote
section, “New Section 1.one,” and renamed it, “Meeting with J.Crandall.one”. The user
added text, “$50,000 for the whole file.” The user also inserted a possible graphic file,
storage path indicates a web notebook stored in the Microsoft cloud, Skydrive.
The information gained in the “P1-343” search could lead the examiner to further
hypothesize that the file inserted is a graphic of the prototype and the meeting was a sale
to a “Mr. Crandall” for “$50,000.” This hypothesis must be verified one step at a time,
starting with the file that was inserted. One method to verify the contents of the file is to
locate the file in OneNote’s cached files folder. Similar to temporary Internet files and
saved web pages, OneNote caches files related to its sections into a folder,
OneNoteOfflineCache_Files
The cache folder is helpful because a file name and extension are not enough to
prove the file inserted into the OneNote section contained company secrets. Any file
could be named “P1-343.png.” By comparing the cached files with the results from the
P1-343 search, the examiner could verify the contents of the specific P1-343.png file that
was inserted. FTK explorer was used to browse the OneNote cache file folder and view
the contents of each cached file. The results from the P1-343 search indicated that
Sorting the list by file name in FTK explorer would make it easier to locate the file,
9
the contents in the FTK viewing window. In this case, the expectation was that the file,
“P1-343.png,” that had been inserted into the OneNote section, would contain a graphic
OneNoteOfflineCache_Files folder as viewed in FTK. The file list was sorted by file
easily located and displayed. The viewing window in FTK indicated the file contained a
graphic of prototype P1-343. The Rielitom owner verified this was a sensitive file. He
was also familiar with a male named Crandall. The next logical step to continue testing
10
the hypothesis would be for the examiner to determine the Skydrive account that was
used and to issue a letter of preservation while a search warrant is crafted for the contents
Discussion
Tom had legitimate access to all prototype files, including P1-343.png. The
existence of the file and references to the file name, were expected in all areas of the
drive. The large number of legitimate file accesses and references that would be seen in a
case such as the Rielitom case, could lead to complacency during the examination.
However, a prudent examiner looks at all the details and puts together a hypothesis from
which to investigate how the file could have been leaked from the company network. The
examiner must test his or her hypothesis while keeping an open mind to all other
possibilities. The details from the coworker and company owner coupled with OneNote’s
storage and caching systems, led the examiner to the conclusion that Tom used a personal
(web) notebook to sneak the prototype file out of the company’s network without using
removable media. Tom was known to be a user of OneNote with unlimited Internet
access at work, was considered to be computer savvy, had legitimate access to sensitive
files, and could not use removable media to sneak a file out. Further, Tom was observed
by a coworker showing the prototype to another person in a bar while talking about
dissatisfaction with his salary. Had the examiner stopped at checking only the local
storage folder for OneNote files, Tom might have been cleared, or at best, the situation
The knowledge of how OneNote stores details about a user’s actions, and the
11
explaining Tom’s activities to verify the examiner’s hypotheses. OneNote’s features are
far more reaching than the simple example that was offered in the scenario. However, the
scenario should provoke thought and further research on the topic. With the availability
and cross platform apps today, OneNote usage will continue to rise. Examiners need
research that will assist them as they are faced with cases involving OneNote.
Microsoft’s bloggers touted in June 2010 about the release of web apps for its
popular Office products. Web apps are components of SkyDrive and include lightweight
versions of Word, PowerPoint, Excel, and OneNote. The web apps program manager for
Microsoft blogged in June 2010, notifying users that the web apps featured the ability to
open OneNote notebooks directly in the browser (Simons, 2010). Through a free
Windows Live account, users can access limited storage in a private SkyDrive, and then
create, store, and share Office documents via web apps, without having to open Office
programs (Microsoft Support, 2012). On January 18, 2011, Microsoft released the first
OneNote app for iPhone, through Apple’s App Store (Numoto, 2011). Later that year, on
December 12, 2011, Microsoft released version 1.3, geared for the iPad (Apple App
Store, 2011). On February 7, 2012, Michael Oldenburg, a Technical Writer in the Office
Division of Microsoft, announced the release of OneNote for Android, which could be
12
Figure 3 is a timeline of the significant OneNote and SkyDrive releases from 2010-2012
Today, tablet and cell phone users of all three leading mobile operating systems,
Microsoft Windows, Apple iOS, and Android, can interact with OneNote files via their
specific mobile apps or a browser using web apps in their SkyDrive. OneNote mobile
may be the key for Microsoft to lure new users, connecting them to SkyDrive in the
OneNote app installs. For instance, according to Google Play’s OneNote app page
(2012), from April 12, 2012, to May 11, 2012, between 500,000-1,000,000 Android users
installed OneNote mobile. The OneNote app page displays the statistics in a graphical
trending chart showing the install history for the last 30 days (“About this app,” chart).
13
Figure 4 displays screen clippings capturing the Google Play OneNote charts posted on
May 11, 2012 (assuming installs between April 12-May 11) and June 23, 2012 (assuming
Assumes Assumes
April 12 – May 11 May 24 – June 23
2012. They show a trending pattern that appears to be increasing and leveling off to a
steady stream of installs (“About this app,” chart). As for Apple installs, according to the
14
Associated Press in the Huffington Post, March 6th edition, for the week ending March
5th, 2012, the Microsoft OneNote App for iPad made it to the top ten, ranked the 8th most
installed free app, ahead of the apps for “Weather Channel Interactive” and “iBooks”.
Some Examiners who have encountered OneNote files reported finding them
difficult to work with during their examinations. One examiner in particular located files
with an extension of .one that appeared to be case relevant and wished to view the
contents. The examiner’s research revealed the files were OneNote files. Lacking the
How can we access to the contents of the Microsoft OneNote files or How to
decrypt this kind of files? …these kind of files have a "one" extension and in a
case I'm dealing with, i have a lot of these files with relevant names, (interesting
filenames). However, how can I access the content of the files or, in other words,
Thanks in advance!
the format is not supported (yet) by the Outside In viewer, and looks like the
http://blogs.msdn.com/chris_pratley/...te-viewer.aspx
The file format itself is documented by microsoft, and claims to be "a revision
based format" which implies the files carry around older revisions with potentially
15
interesting data, should you feel like tackling the decoding. (Guidance Software,
2009, para. 2)
In these 2009 posts, neither the initiator nor the responder was familiar with OneNote
files. Now in 2012, OneNote is available as an app, downloaded daily in the mobile app
Office suite. With OneNote so readily available and Microsoft’s efforts to market
OneNote mobile and web apps, it is only natural that users will try it out. New apps like
OneNote that become popular create the need for examiners to become familiar with its
and its files is to install and use it themselves. When users keep track of the changes that
take place upon installation and usage and publish them in a document, it is a whitepaper.
Examiners test and validate whitepapers by attempting to follow the steps described in
the document, and comparing their own results to the results described in the paper. Once
vetted, the whitepaper becomes a guide for examiners to follow as they conduct an
examination involving the application and its data files. It is more efficient for examiners
to build off of previously written whitepapers rather than starting from scratch. It
perpetuates the cycle of testing and validation of previous and new research. In the
literature review section of this study, the lack of whitepapers and instructional writings
are what drove the research, resulting in the testing and documentation of methods used
to investigate a case involving OneNote. Other researchers will test and validate the
16
Artifacts Associated With Various OneNote installations
The installation process and some operating system artifacts for OneNote are
predictable for each device type and operating system. The artifacts will vary among the
different installations and usage. For instance, variations in the artifacts occur when
OneNote is installed on a local machine, rather than running it from the cloud.
become familiar with the different installation methods, the OneNote file structure, and
component of Office. This research used a full installation of OneNote as an Office 2010
an iPhone, iPad, iPod, Windows Phone 7, or on various Android phones and tablets. This
research used an ASUS Transformer Prime TF-201 tablet running the Android version
4.0, Ice Cream Sandwich (ICS) platform. The SkyDrive app, used to access OneNote
files stored in the Microsoft cloud, may be installed on Windows or Mac computers.
This research used a SkyDrive app installed on a Windows 7, x64 PC and a MacBook
Pro running OS X (Lion), to access OneNote web notebooks stored in a user’s SkyDrive.
leave artifacts that may be collected to prove or disprove the usage of OneNote occurred.
Artifacts collected from various installs and devices make up a large portion of this
research. These examples will provide insight to examiners encountering cases involving
OneNote.
17
OneNote Artifacts When Installed on a Windows PC
determine the install location, date, and time when the installation occurred. In Windows
should be extracted from an image of the subject hard drive. The files cannot be extracted
while Windows is in use. Using the Windows native viewer in the Control Panel, the
Application log can be opened by selecting the option to Open Saved log from the Action
menu and navigating to the location where the extracted event log files were saved. The
Application log file may be searched for “OneNote” to find entries relating to the date
The OneNote install date, time, and location details can also be determined in a
Windows PC by enlisting the assistance of a tool that automatically parses and displays
the contents of the prefetch folder. Windows keeps track of each executable file and its
associated dependent files as they are run. In doing so, Windows creates a .pf file in the
prefetch folder for future reference in case the user runs that program again, preloading
the necessary components. Prefetch entries contain date, time, and location information
about where the executable and dependent files are stored. Nir Sofer has published
WinPrefetchView, a tool that parses and displays the prefetch files located in
C:Windows/Prefetch. The resulting list can be sorted or just scrolled through, to search
for “OneNote.” The findings may help determine when the installation file was launched,
where it was launched from, and where the dependent files are stored. The tool also has
18
All changes made to the system by installing OneNote on a Windows PC can be
documented through a process of capturing a baseline of the system state before installing
OneNote, and then comparing the system state again after the installation. WhatChanged
is a freeware utility from Vista Software that automates this process. With this tool, the
user takes a system snapshot before an event, runs the event, and takes a second snapshot.
The tool compares the two snapshots reporting the changes that have occurred since the
first snapshot (Vista Software, 2011). Documenting the new or changed files and folders
created before and after installation, will give the examiner a baseline of what to look for
The install location and various settings can also be obtained by viewing the
associated entries in the Windows Registry. A tool such as Registry Viewer from
AccessData is helpful to parse and browse the software hive from the Windows registry
2006). Another registry file that contains user settings, NTUSER.DAT, is located in the
activity settings. The file must be opened using a registry file viewer such as the Registry
Viewer or Windows native registry viewer, Regedit. A rather significant artifact that can
be obtained from the NTUSER.DAT file is the location of recently accessed, saved and
backed up notebooks. These values may help determine if a user stored a OneNote
19
OneNote\OpenNotebooks in the registry might offer clues about any offsite notebook
accesses.
The concept of SkyDrive notebooks connected over the Internet suggests the
analysis of Internet history may uncover additional artifacts. Internet history files should
be extracted from the user account within the acquired image. An alternative is to mount
the image using AccessData’s FTK Imager version 3+, and use a tool such as Digital
Detective, 2012). All of the installation artifacts change, or will not be present, if
OneNote is used in an alternative method like through the SkyDrive app, mobile apps, or
System-Requirements page, users can download and install the SkyDrive app for systems
Windows Vista with Service Pack 2 and the Platform Update for Windows Vista,
or Windows Server 2008 R2, or Windows Server 2008 with Service Pack 2 and
the Platform Update for Windows Server 2008, or Mac OS X 10.7 Lion. (para. 1)
Installing the app will create a SkyDrive folder that can be accessed just like any other
OneNote in conjunction within the SkyDrive, users can create, edit, share, and delete web
20
not, OneNote stores the changes and synchronizes when the SkyDrive connection
“SkyDrive” folder that can be accessed from the MAC just like any other folder, but the
files are stored on the user’s SkyDrive. OneNote itself is not available as a full
installation for MAC. However, with the OneNote web app used in conjunction with the
SkyDrive, MAC users can create, edit, share, and delete notebooks.
OneNote is used in conjunction with SkyDrive or any cloud services. In cases where the
user stores OneNote files directly to the cloud, obvious artifacts may be scarce. However,
a deeper examination may uncover helpful artifacts. For instance, operating systems keep
track of network connections, update Internet history, and recent file lists. Operating
systems may also store temporary Internet files, as well as snippets of files, in RAM and
the page file. Examiners do themselves a service when they include a memory capture
(take a snapshot of RAM before shutting the machine down) as part of their routine data
collection. The memory may contain remnants of files opened from SkyDrive, or details
of the running processes, showing the usage of web apps and accesses to the SkyDrive.
Knowing what to search for requires an understanding of the OneNote file structure and
its features. Examiners who lack experience with OneNote files will seek whitepapers
and previously conducted studies, drawing upon the experience of other examiners.
21
OneNote Artifacts: OneNote Mobile Apps
mobile device or tablet are starkly different from a PC. There is no Windows application
event log or familiar Windows registry to glean OneNote details. These devices often
have no removable storage and can only be accessed by connecting them to a computer
over a cable. Specialized skills are needed to work with these mobile devices.
iDevices. The OneNote App from the Apple Store (iTunes) can be installed on
iDevices. According to its documentation on the App Store (2011), users who install
OneNote can create searchable text notes, which are always available on their SkyDrive.
Installation requires iPhone, iPod, or iPad with iOS 4.3 (Requirements section).
Android Devices. OneNote mobile may be downloaded from the Google Play
store for Android devices running 2.3 or newer. Once installed, an icon for OneNote
Mobile appears on the Android’s desktop. When clicked, OneNote opens a local cache of
Groups of users who are all using HTML5-compatible browsers like Firefox 4,
Google Chrome, Internet Explorer 9, Opera, or Safari can work together at the same time
in a shared OneNote Web notebook (Matthews, 2011). Using this method, when any of
the users makes changes, SkyDrive is able to save them online in one place. Each user’s
updates or additions to the notebook are recorded. The view authors feature allows all
users to see each other’s updates in near real-time. SkyDrive keeps track of the previous
older version using the Show Page Versions feature (Microsoft, 2012). The actions a user
22
performs in OneNote apps still have to be run through the processor and memory.
Operating systems commonly use some form of swapping data between virtual memory
(pagefile) and RAM (Random Access Memory) for efficiency. These areas should not be
overlooked when searching for OneNote artifacts. They should be searched for OneNote
File Header
partial file. A thorough search of a hard drive includes all areas including the system
files, unused disk areas, and a search of the memory. All or part of a file may be
recoverable using an advanced searching technique which requires locating the file by
recognizing its contents. Examining several OneNote .one files for the common first few
bytes establishes the pattern that is common at the beginning of all .one files. The first 16
D0 29 96 D3.” These bytes are called the file header, or signature. Forensic tools can be
used to search for a file’s signature. This is a common technique used by analysts, to
locate and carve files. As a method of testing the file header to see if it could be used
Software (now available in version 7) was configured with a new file signature to search
for OneNote file headers (Guidance Software, 2012). EnCase Forensic comes with
Microsoft Office file signatures built-in, but OneNote was not among them.
23
Figure 5 shows the results of searching by the added file signature in EnCase (set up as a
\xE4\x52\x5C\x7B\x8C\xD8\xA7\x4D\xAE\xB1\x53\x78\xD0\x29\x96\xD3).
OneNote keeps its own type of recycle bin and backup system. Though a user
may have deleted a page, it could be stored in the OneNote recycle bin. A user can
configure the frequency of backups and the storage location for backups and other
important files. The settings are accessed by the user within OneNote in the File, Options
menu. The user can select the location for Unfiled Notes Section, the Backup Folder, and
the Default Notebook. The frequency and number of backups to keep on file can be
customized as well. How much unused space to allow in files before optimizing occurs,
can be set to a percentage. Even the Cache file location can be chosen by the user. David
24
Rasmussen (2006) blogged about OneNote synchronization and how to use a OneNote
file between multiple computers. He explained that OneNote writes everything to a cache
file location and then later quietly synchronizes with the actual file data. This way, if a
network file is in use, and the network becomes unavailable, the user can continue
working. When the connection is restored, the file will be synchronized. Rasmussen
added that this feature is also handy for those who store their OneNote notebooks on a
removable media because they can work between computers (Rasmussen, 2006).
Any notebook that has been opened on a local machine will have parts of it
cached. Sometimes the whole notebook section is cached. Even web notebooks may have
parts cached in OneNote’s internal caching system or the operating system’s paging file.
Given this feature, analysts should always conduct a search by file header and unique
keywords to find all OneNote files, or remnants of cached data, within the hard drive
from the local machine. OneNote stores deleted pages for up to 60 days before actually
deleting them. It has its own built in recycle bin, OneNote_DeletedPages.one (Pierce,
2011). Figure 6 displays OneNote headers that were detected in the operating system’s
a large amount of case relevant data. Typical users will be unaware of the continued
25
existence of data they have deleted, or never intentionally saved to the local machine.
Examiners who are familiar with the forensic artifacts of OneNote will know where to
start looking for deleted .one files and backup copies. They will also know how to
discover the deeper OneNote artifacts hidden within the files themselves. As new cases
involving OneNote emerge, many examiners will be forced to study the forensic artifacts
of OneNote all at once. They will reach out to other examiners or conduct Internet
searches, trying to understand this complex application, having its own internal recycle
bin, backup, and caching system. This body of research will be a starting place for them.
conducting an investigation involving OneNote. The research will require many tedious
hours of testing and validation. The researcher’s time is largely spent documenting steps
taken and the results, and recreating the work to validate the results. It is a project worthy
of its burden. Many forensic examiners will benefit from the published results, saving
countless hours of on-the-fly learning when working a critical case involving OneNote.
More documentation of actual cases involving OneNote and the techniques used to
OneNote and its files may appear obscure when compared to the files examiners
see in daily examinations. However, the simple but not uncommon, Rielitom scenario
presented in the literature review section in this study, demonstrates the need for the
OneNote file type to be recognized by the mainstream forensic suites. The fact that
26
OneNote is likely to emerge in more examinations (cross platform – PC, MAC, and
mobile apps), it makes sense that the most common forensic suites should include file
headers to search for the OneNote file types. The Mainstream forensic suite providers
should be urged to include the OneNote file headers in their default set or as an update.
The software providers including the OneNote header would cut down on the time an
examiner must devote to determining the proper hexadecimal code and adding the file
header (a skill that requires training initially and must be developed over time), as
demonstrated in File Structure: File Header, in this study. It would also help examiners
who are unfamiliar with OneNote to find hidden .one files and to recover lost, damaged,
or partial files.
All Office apps, not just OneNote, integrate easily with SkyDrive. Research needs to be
conducted on the artifacts created by interaction with SkyDrive. Areas of research that
used with web apps, 3) SkyDrive’s network sharing permissions, and 4) The network
traffic generated when connected to a SkyDrive. In the Rielitom scenario in this study, a
user was able to sneak data from the company network to a SkyDrive, bypassing local
security measures (prohibited removable media). Even the web apps of the Office
applications leave some trace on the computer used to access those files. These areas
need research and testing to document where examiners should begin when there is an
27
Conclusion
with other Microsoft Office products. It can even be run from the web without
installation on the local machine. Since 2010, Microsoft has released free web versions of
its Office apps for PC and MAC, including OneNote. In addition to the desktop version
of OneNote and the SkyDrive desktop app, starting in 2011, mobile apps were also
released for all mainstream mobile devices including iOS and Android (Simons, 2010;
Microsoft Support, 2012). Forensic examiners can now expect to start seeing OneNote
files during their investigations. There is so little awareness and documentation for
examiners about the forensics of OneNote that its artifacts could easily go ignored or
improperly analyzed. Yet, those artifacts could be the smoking gun in the investigation.
The only documentation found offering a method for examiners to work with .one
files, suggested just opening the files in the native application, OneNote (Guidance
Software, 2009). This method does allow limited access to the artifacts, but does not
address the entries in the cache file, which may contain the smoking gun or clues to
offsite storage locations. When a user stores OneNote files directly to a SkyDrive web
notebook, the cache file may contain clues that will assist in the investigation explaining
not only the method used, but may show intent. The literature review in this study used a
notebook was created on a SkyDrive and accessed from OneNote installed on a local
machine. A new section was created in the web notebook. Text and a graphic file were
28
inserted into the section. The cache file, “OneNoteOfflineCache.onecache,” was
immediately analyzed and artifacts were collected. Supplemental research and testing are
needed to determine when the cache file is overwritten. This study does not address how
described in the document and comparing their own results to the results described in the
paper. The lack of whitepapers on OneNote forensics was an obstacle for this study that
propelled the research forward and confirmed its necessity. Through lengthy testing and
analysis, the OneNote file structure and its features were examined to determine how
The findings were delivered through the use of a hypothetical criminal case
scenario where OneNote was central to the crime. In the scenario, a computer savvy
employee used OneNote to leak company secrets. A walk-through delivery style was
used to present the examination of the employee’s work computer. OneNote’s internal
file caching system contained the keys to solving how the suspect leaked the company
secrets by inserting a file into a OneNote web notebook. The web notebook was stored in
his SkyDrive on the Internet. On the surface it appeared there were no OneNote
examiners need to become familiar with OneNote and its capabilities. Conscientious
examiners will read the scenario and recognize that it was due to the understanding of
29
OneNote’s caching features, and how it integrates with the cloud, that the examiner did
not overlook the smoking gun. Examiners who are not familiar with OneNote could
Though it has been around for years, OneNote is still in its infancy, having only
been available freely in SkyDrive since 2010 and to the mobile app stores since 2011.
examiners tenaciously research any unfamiliar file. However, at the present time, their
efforts would be unfruitful when searching for forensic details about .one files. The
place for finding OneNote artifacts. The scarcity of documented research, coupled with
the relatively “new” OneNote, could result in the guilty remaining free to harm again, or
the innocent suffering injustice for lack of uncovering the keys to exoneration.
created by OneNote, and to inspire researchers to conduct more in depth testing and
analysis. Pioneering this type of foundational research is based in part on experience, and
in part on investigative instinct. Providing it to the forensic community bridges the gap in
available research on the forensic artifacts of Microsoft OneNote. The artifacts offered in
this study are only a starting place. Hopefully more researchers and investigators will
devote time to studying the forensic artifacts of OneNote, providing their findings to the
forensic community as well. In doing so, they make an exciting contribution to the body
30
of knowledge for others to draw upon when they need it most, during an important
31
Bibliography
Access Data Corp. (2006). adownloads. Retrieved April 16, 2012, from
http://accessdata.com/support: http://accessdata.com/support/adownloads
http://accessdata.com/products/computer-forensics/ftk
accessdata.com:
http://accessdata.com/downloads/current_releases/imager/FTKImager_UserGuide
Apple App Store. (2011, December 11). Microsoft OneNote. Retrieved May 22, 2012,
Associated Press. (2012, March 6). The top iPhone and iPad apps on App Store.
http://www.huffingtonpost.com/huff-wires/20120306/us-itunes-apps-top-10/
Carvey, H. (2012, April). Interview with Harlan Carvey. Retrieved June 13, 2012, from f-
interviews.com: http://f-interviews.com/2012/04/11/interview-with-harlan-carvey/
detective.co.uk: http://www.digital-detective.co.uk/netanalysis.asp
Edwards, T., & Edwards, L. (2012, April 4). OneNote 2010 Sort Utility. Retrieved June
Google Play. (2012, Apr-May). OneNote Mobile. Retrieved May 10, 2012, from Google
Play: https://play.google.com/store/apps/details?id=com.microsoft.office.onenote
32
Guidance Software. (2009, December 4). Support Portal. Retrieved May 11, 2012, from
Guidance Software:
https://support.guidancesoftware.com/forum/showthread.php?t=36548&highlight
=onenote
guidancesoftware.com: http://www.guidancesoftware.com/encase-forensic.htm
http://www.geek.com/articles/news/skydrive-update-brings-html5-powered-
awesomeness-20110621/
Microsoft. (2012). SkyDrive and Office work together. Retrieved May 24, 2012, from
windows.microsoft.com: http://windows.microsoft.com/en-US/skydrive/work-
together-online
Microsoft. (2012). SkyDrive system requirements. Retrieved May 22, 2012, from
windows.microsoft.com: http://windows.microsoft.com/en-US/skydrive/system-
requirements
Microsoft Support. (2012). Using Office Web Apps in Skydrive. Retrieved May 22, 2012,
help/using-office-web-apps-in-skydrive-HA101231889.aspx
Numoto, T. (2011, January 18). Starting today, OneNote Mobile for iPhone helps free
http://blogs.office.com/b/office-exec/archive/2011/01/18/onenote-mobile-for-
iphone-helps-you-free-your-ideas.aspx
33
Oldenburg, M. C. (2012, February 7). OneNote Mobile for Android is now available
http://blogs.office.com/b/microsoft-onenote/archive/2012/02/07/onenote-mobile-
for-android-is-now-available-worldwide.aspx
Pierce, J. (2011). MOS 2010 Study Guide for Microsoft OneNote (Kindle Edition ed.).
OReilly Media.
Rasmussen, D. (2006, June 29). David Rasmussen's Blog. Retrieved April 16, 2012, from
http://blogs.msdn.com:
http://blogs.msdn.com/b/david_rasmussen/archive/2006/06/29/650705.aspx
Simons, N. (2010, June 7). Office Web Apps Blog. Retrieved May 22, 2012, from
http://blogs.office.com:
http://blogs.office.com/b/officewebapps/archive/2010/06/07/office-web-apps-
now-available-on-windows-live.aspx
http://www.nirsoft.net: http://www.nirsoft.net/utils/win_prefetch_view.html
http://www.vtaskstudio.com: http://www.vtaskstudio.com/support.php
34