On Thu, Jun 27, 2024 at 02:49:07PM -0600, Andy Bradford wrote:
> Thus said Anon Loli on Thu, 27 Jun 2024 04:12:57 -0000:
> 
> > No kidding?  The 1st few  people made it sound  like it's going  to be
> > relatively easy :(
> 
> I  don't think  anyone said  it was  going to  be easy,  only that  your
> primary focus should be simply to get a good copy of the raw unencrypted
> partition  while  it was  still  available  using simple  techniques  as
> quickly as possible.
> 
> If you have obtained it, your next goal should be to figure out now what
> to do  with it. As  I understand  it, you wrote  74MB of garbage  at the
> front of that partition. This will have undoubtedly destroyed filesystem
> metadata and some  other data. Can the filesystem be  "recreated" in the
> first 74MB as just empty filesystem  space while leaving the rest of the
> existing data and  filesystem in tact? I don't know  the answer to that.
> Maybe there  is someone with  more FFS experience that  does. Presumably
> you know the exact size of the  partition and so could at least recreate
> an  empty filesystem  using newfs  with  the same  parameters. Could  it
> possible to then stich in or reattach chunks of data into this from your
> copy? Again, I don't know. Who does?
> 
> Any work you  do at recovery should  be done on yet another  copy of the
> same data so that you can keep one "master" copy around just in case.
> 
> Some tools for recovering files can  be found in packages like sleuthkit
> and testdisk. There may be others of which I'm unaware.
> 
> Andy
> 

I'll see what I can do with Sleuth Kit, thanks!

Reply via email to