

The first thing you might want to try is using Windows tools to fix the errors. To do this, open the command prompt as an administrator and type:
chkdsk f: /f
Naturally, you’ll need to replace “f:” with the current drive letter. The /f parameter indicates that errors should be fixed during the scan.
If the operation was successful, you can try opening the files. However, you might encounter the error “Chkdsk is not available for RAW drives.” Don’t worry, we have a couple of other options up our sleeve. Let’s use a specialized program called DMDE.
DMDE is an impressive program that’s useful for searching, editing, and recovering data on disks. The developer claims it employs advanced algorithms that enable it to restore directory structures and files in complex situations where other programs may not succeed.
DMDE includes a disk editor, a basic partition manager, and the ability to create images and clone disks, as well as reconstruct RAID arrays, among other features. The paid versions support unrestricted file and directory recovery, but the free version is also quite effective and helpful in many situations.
After launching the program, select your storage device.

A window with sections opens, where we select full scan by double-clicking.

After the quick scan, navigate up to the “Found” folder and click on “All found + reconstruction.” A dialog box will open where you should select “Rescan the current file system” and then wait for the operation to complete.

After scanning, DMDE will display a list of found files. Browse through the folders and select what you want to recover. Unfortunately, the free version does not allow you to recover entire folders. To recover individual files, right-click on the file, select “Restore Object,” then specify the destination for recovery and click OK.

It is worth noting that file names are generated automatically and often do not match the originals. Don’t be surprised if some files are “corrupted” or if artifacts appear in the photos. Interestingly, images can sometimes be restored using special utilities. For example, Recuva or R-Studio. To my great surprise, the last program managed to restore almost completely damaged photos to a very good quality with minimal artifacts—many of its competitors failed to achieve this.
In summary, good luck with the recovery! However, it’s best to immediately transfer all data from temporary storage and create backups.

2023.07.20 — Evil modem. Establishing a foothold in the attacked system with a USB modem
If you have direct access to the target PC, you can create a permanent and continuous communication channel with it. All you need for this…
Full article →
2022.01.11 — Persistence cheatsheet. How to establish persistence on the target host and detect a compromise of your own system
Once you have got a shell on the target host, the first thing you have to do is make your presence in the system 'persistent'. In many real-life situations,…
Full article →
2022.01.01 — It's a trap! How to create honeypots for stupid bots
If you had ever administered a server, you definitely know that the password-based authentication must be disabled or restricted: either by a whitelist, or a VPN gateway, or in…
Full article →
2023.02.21 — Pivoting District: GRE Pivoting over network equipment
Too bad, security admins often don't pay due attention to network equipment, which enables malefactors to hack such devices and gain control over them. What…
Full article →
2022.02.09 — Kernel exploitation for newbies: from compilation to privilege escalation
Theory is nothing without practice. Today, I will explain the nature of Linux kernel vulnerabilities and will shown how to exploit them. Get ready for an exciting journey:…
Full article →
2023.01.22 — Top 5 Ways to Use a VPN for Enhanced Online Privacy and Security
This is an external third-party advertising publication. In this period when technology is at its highest level, the importance of privacy and security has grown like never…
Full article →
2022.04.04 — Fastest shot. Optimizing Blind SQL injection
Being employed with BI.ZONE, I have to exploit Blind SQL injection vulnerabilities on a regular basis. In fact, I encounter Blind-based cases even more frequently…
Full article →
2022.12.15 — What Challenges To Overcome with the Help of Automated e2e Testing?
This is an external third-party advertising publication. Every good developer will tell you that software development is a complex task. It's a tricky process requiring…
Full article →
2022.06.01 — Routing nightmare. How to pentest OSPF and EIGRP dynamic routing protocols
The magic and charm of dynamic routing protocols can be deceptive: admins trust them implicitly and often forget to properly configure security systems embedded in these protocols. In this…
Full article →
2023.03.26 — Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques
Chances are high that you had dealt with DHCP when configuring a router. But are you aware of risks arising if this protocol is misconfigured on a…
Full article →