LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Hardware (https://www.linuxquestions.org/questions/linux-hardware-18/)
-   -   How to reach information of a CDROM after apparent EOF? (https://www.linuxquestions.org/questions/linux-hardware-18/how-to-reach-information-of-a-cdrom-after-apparent-eof-826420/)

eantoranz 08-15-2010 07:26 PM

How to reach information of a CDROM after apparent EOF?
 
Hello!

I have in my hand a CDROM with photos created by some greedy photographer. When I mount it I can see two files in there, two .exe executables about 7.7 MBs in size each. When I try to create an ISO of the cdrom, I get an IO error and only 16 MBs end up at the file.... so I would expect the photo files after the apparent EOF of the device (or whatever it's called in CDROM jargon).

Is there a way to get past this point so that I could run magicrescue on the rest of the CD so that i can get the rest of the files?

Or are there other handson hacky methods to get to that data?

Thanks in advance.

business_kid 08-16-2010 04:21 AM

I would unmount it, and

dd if=/dev/cdrom of=/somewhere/safe/ and operate on it there.
The exe files are nearly certainly zipped data. What does autorun.inf say?

onebuck 08-16-2010 06:13 AM

Hi,
Quote:

Originally Posted by eantoranz (Post 4067214)
Hello!

I have in my hand a CDROM with photos created by some greedy photographer.

Proprietary?
Quote:

Originally Posted by eantoranz (Post 4067214)
When I mount it I can see two files in there, two .exe executables about 7.7 MBs in size each. When I try to create an ISO of the cdrom, I get an IO error and only 16 MBs end up at the file.... so I would expect the photo files after the apparent EOF of the device (or whatever it's called in CDROM jargon).

Is there a way to get past this point so that I could run magicrescue on the rest of the CD so that i can get the rest of the files?

Or are there other handson hacky methods to get to that data?

Thanks in advance.

I believe your asking us to aid in cracking a piece of protected information by providing methods to circumvent the encryption by the original author. This would violate the LQ Rules.

:tisk:

eantoranz 08-16-2010 08:59 AM

There is no autorun.inf file in them (if I can remember correctly).

Also, I'm not asking to crack encrypted information. I'd think the photos are after this point where dd "breaks" reading the CDROM device.

I'll check the zip possibility, just in case.

unSpawn 08-16-2010 06:34 PM

Quote:

Originally Posted by eantoranz (Post 4067748)
I'll check the zip possibility, just in case.

Posting exact commands and error messages, running 'file' on the executables and running verbose 'fdisk -l', isoinfo, running 'find' on the ISO image (or whatever else diagnostics you can think of) could come in handy as basically any info like jewelcase inlay, disk creator, write type, session and TOC nfo may be interesting.


All times are GMT -5. The time now is 08:18 PM.