Ntfs Recovery Tool For Bilibili Cookie Under Autoup

NTFS
recovery
remedy
system manage
undelete
This article discusses NTFS recovery tools for retrieving bilibili cookies from AutoUP and emphasizes the importance of unmounting the disk before scanning. It provides various methods, including using adb shell commands with pv or netcat/gzip, and mentions solutions to LF encoding issues.
Published

July 17, 2022


unmount the disk before scanning!

ntfsundelete

autopsy

disk drill

recuperabit(good for small files)

recoverpy

korczis/foremost

could also try to retrieve from android phones (/data/data/tv.danmaku.bili)

https://roubert.name/joakim/androidfilerecovery/

apt-get install testdisk pv extundelete

adb shell ls /dev/block

Now let us dump the content of that /dev/block/mmcblk0 that we found to the computer. With adb shell we can become superuser and execute cat to dump the content like this:

$ ./adb shell su -c “cat /dev/block/mmcblk0” | pv > mmcblk0.raw

Pipe Viwer (pv) is optional, but I like to see the transfer progress information it provides.

(And of course you can change mmcblk0.raw to some other directory/filename if you want to.)

Addition: André Paixão wrote to me that he just got an empty file with the command above. He solved it by using adbd insecure.

Addition: Daniel Jeliński wrote to me that he ran into issues with LF encoding. The solution that worked for him was:

./adb shell su -c “cat /dev/block/mmcblk0” | pv | sed ‘s/^M$//’ > mmcblk0.raw

…where ^M is what you get by pressing Ctrl+V followed by Ctrl+M.

Addition: Marc also ran into the LF problems, but solved it this way:

./adb shell “su -c ‘stty raw; cat /dev/block/mmcblk0’” | pv > mmcblk0.raw

Addition: Tim de Waal wrote to me that he prefers using netcat/gzip instead:

On the Android device (adb shell with su), run:

dd if=/dev/block/mmcblk0 | gzip -9 | nc -l 5555

On the computer, run:

nc [AndroidIP] 5555 | pv -b > mmcblk0.img.gz

testdisk mmcblk0.raw