Function
| Arg | Description | Type | 
|---|---|---|
| device | The device file to open. This may be a full path for example C:\Windows - we will figure out the device automatically. | string | 
| filename | A raw image to open. You can also provide the accessor if using a raw image file. | OSPath | 
| mft_filename | A path to a raw $MFT file to parse. | OSPath | 
| accessor | The accessor to use. | string | 
| inode | The MFT entry to parse in inode notation (5-144-1). | string | 
| mft | The MFT entry to parse. | int64 | 
| mft_offset | The offset to the MFT entry to parse. | int64 | 
Parse specific inodes from an NTFS image file or the raw device.
This function retrieves more information about a specific MFT entry including listing all its attributes.
It can either operate on an image file or the raw device (on windows), or alternatively you can provide a raw $MFT file.
SELECT parse_ntfs(
    filename='ntfs_image.dd',
    inode="46-128-0")
FROM scope()
You can get the MFT entry number from parse_mft() or from the
Data attribute of a glob() using the ntfs accessor.
If you have previously collected the $MFT file (e.g. using the
Windows.KapeFiles.Targets artifact, you can use parse_ntfs()
to get more information about each MFT entry:
SELECT EntryNumber, OSPath,
   parse_ntfs(mft_filename=MFTFile, mft=EntryNumber) AS Details
FROM parse_mft(filename=MFTFile)
Note that the raw $MFT file is sometimes not sufficient to reconstruct all attributes (for example if attributes are not stored in the $MFT but in external clusters).