

The first thing you might want to try is using Windows tools to fix the errors. To do this, open the command prompt as an administrator and type:
chkdsk f: /f
Naturally, you’ll need to replace “f:” with the current drive letter. The /f parameter indicates that errors should be fixed during the scan.
If the operation was successful, you can try opening the files. However, you might encounter the error “Chkdsk is not available for RAW drives.” Don’t worry, we have a couple of other options up our sleeve. Let’s use a specialized program called DMDE.
DMDE is an impressive program that’s useful for searching, editing, and recovering data on disks. The developer claims it employs advanced algorithms that enable it to restore directory structures and files in complex situations where other programs may not succeed.
DMDE includes a disk editor, a basic partition manager, and the ability to create images and clone disks, as well as reconstruct RAID arrays, among other features. The paid versions support unrestricted file and directory recovery, but the free version is also quite effective and helpful in many situations.
After launching the program, select your storage device.

A window with sections opens, where we select full scan by double-clicking.

After the quick scan, navigate up to the “Found” folder and click on “All found + reconstruction.” A dialog box will open where you should select “Rescan the current file system” and then wait for the operation to complete.

After scanning, DMDE will display a list of found files. Browse through the folders and select what you want to recover. Unfortunately, the free version does not allow you to recover entire folders. To recover individual files, right-click on the file, select “Restore Object,” then specify the destination for recovery and click OK.

It is worth noting that file names are generated automatically and often do not match the originals. Don’t be surprised if some files are “corrupted” or if artifacts appear in the photos. Interestingly, images can sometimes be restored using special utilities. For example, Recuva or R-Studio. To my great surprise, the last program managed to restore almost completely damaged photos to a very good quality with minimal artifacts—many of its competitors failed to achieve this.
In summary, good luck with the recovery! However, it’s best to immediately transfer all data from temporary storage and create backups.

2022.06.01 — Routing nightmare. How to pentest OSPF and EIGRP dynamic routing protocols
The magic and charm of dynamic routing protocols can be deceptive: admins trust them implicitly and often forget to properly configure security systems embedded in these protocols. In this…
Full article →
2023.02.21 — SIGMAlarity jump. How to use Sigma rules in Timesketch
Information security specialists use multiple tools to detect and track system events. In 2016, a new utility called Sigma appeared in their arsenal. Its numerous functions will…
Full article →
2022.02.09 — First contact: An introduction to credit card security
I bet you have several cards issued by international payment systems (e.g. Visa or MasterCard) in your wallet. Do you know what algorithms are…
Full article →
2023.02.13 — Ethernet Abyss. Network pentesting at the data link layer
When you attack a network at the data link layer, you can 'leapfrog' over all protection mechanisms set at higher levels. This article will walk…
Full article →
2022.01.13 — Bug in Laravel. Disassembling an exploit that allows RCE in a popular PHP framework
Bad news: the Ignition library shipped with the Laravel PHP web framework contains a vulnerability. The bug enables unauthorized users to execute arbitrary code. This article examines…
Full article →
2023.02.12 — Gateway Bleeding. Pentesting FHRP systems and hijacking network traffic
There are many ways to increase fault tolerance and reliability of corporate networks. Among other things, First Hop Redundancy Protocols (FHRP) are used for this…
Full article →
2022.02.15 — Reverse shell of 237 bytes. How to reduce the executable file using Linux hacks
Once I was asked: is it possible to write a reverse shell some 200 bytes in size? This shell should perform the following functions: change its name…
Full article →
2023.01.22 — Top 5 Ways to Use a VPN for Enhanced Online Privacy and Security
This is an external third-party advertising publication. In this period when technology is at its highest level, the importance of privacy and security has grown like never…
Full article →
2022.12.15 — What Challenges To Overcome with the Help of Automated e2e Testing?
This is an external third-party advertising publication. Every good developer will tell you that software development is a complex task. It's a tricky process requiring…
Full article →
2023.02.21 — Pivoting District: GRE Pivoting over network equipment
Too bad, security admins often don't pay due attention to network equipment, which enables malefactors to hack such devices and gain control over them. What…
Full article →