Function
Arg | Description | Type |
---|---|---|
device | The device file to open. This may be a full path for example C:\Windows - we will figure out the device automatically. | string |
filename | A raw image to open. You can also provide the accessor if using a raw image file. | OSPath |
mft_filename | A path to a raw $MFT file to parse. | OSPath |
accessor | The accessor to use. | string |
inode | The MFT entry to parse in inode notation (5-144-1). | string |
mft | The MFT entry to parse. | int64 |
mft_offset | The offset to the MFT entry to parse. | int64 |
Parse specific inodes from an NTFS image file or the raw device.
This function retrieves more information about a specific MFT entry including listing all its attributes.
It can either operate on an image file or the raw device (on windows), or alternatively you can provide a raw $MFT file.
SELECT parse_ntfs(
filename='ntfs_image.dd',
inode="46-128-0")
FROM scope()
You can get the MFT entry number from parse_mft()
or from the
Data attribute of a glob()
using the ntfs
accessor.
If you have previously collected the $MFT file (e.g. using the
Windows.KapeFiles.Targets
artifact, you can use parse_ntfs()
to get more information about each MFT entry:
SELECT EntryNumber, OSPath,
parse_ntfs(mft_filename=MFTFile, mft=EntryNumber) AS Details
FROM parse_mft(filename=MFTFile)
Note that the raw $MFT file is sometimes not sufficient to reconstruct all attributes (for example if attributes are not stored in the $MFT but in external clusters).