接着昨天继续搞(圣诞节警告

0x00.前言

大佬组的ESXI最近遇到了一个问题——硬盘炸了,其实印象里早在前一阵子就貌似在日志里看到过硬盘的警告……
但是并没有过于在意于是就暂时放下了,但是最近一次重启(为了给ESXI打上unlocker补丁)之后wz说他的虚拟机开机之后全?炸了(黑群晖、DebianEVE)……
怀疑是某块500 GB硬盘的锅于是立即挂起全部虚拟机,把硬盘插到台式上进行磁盘检查(还拿走了本人的U盘被迫作成PE),扫描还没到5 min就看到了前面的数十个坏道点,过草……

草

近期,tb搞了块60块钱左右的硬盘先凑合用,年后准备把这套卖掉之后组建更高性能的(预计5K
然后,趁着旧硬盘还没彻底报废赶紧在web端进行导出,这里导出了仨文件:macOS.ovfmacOS.mfdisk-0.vmdk
比较有意思的是disk-0.vmdk占用33.3 GB而实际存储的macOS.vmdk可是有44.92 GB……
然后,打了一份快照备用之后在数据存储浏览器中立即进行数据迁移,没错,VMs就是那块「一副要死的样子」的硬盘……

VMs
VMs

终于挪完地方了~

任务目标启动者已排队时间启动时间结果完成时间
Copy Datastore Fileroot2019/12/25 19:04:152019/12/25 19:04:15成功完成2019/12/25 20:31:21

0x01.Unlocker

gh上原版的Unlocker应该是找不到了,只找到了其他仓库,最开始接触这玩楞应该是大一大二那时候,连py还都不会呢
三四年后的今天,也能看个大概这个补丁的原理了,除了替换之外还去官网下载com.vmware.fusion.tools.darwin.zip.tar文件
这样Unlocker文件的作用也大概搞懂了(

先结束这四个进程
先结束这四个进程

以管理员权限运行:

1
C:\Windows\System32>"D:\yuangezhizao\Documents\Virtual Machines\unlocker-3.0.2\win-install.cmd"
2
3
Unlocker 3.0.2 for VMware Workstation
4
=====================================
5
(c) Dave Parsons 2011-18
6
7
Set encoding parameters...
8
Active code page: 850
9
10
VMware is installed at: C:\Program Files (x86)\VMware\VMware Workstation\
11
VMware product version: 15.1.0.13591040
12
13
Stopping VMware services...
14
15
Backing up files...
16
C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe -> D:\yuangezhizao\Documents\Virtual Machines\3.0\unlocker-3.0.2\backup\x64\vmware-vmx.exe
17
1 File(s) copied
18
C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe -> D:\yuangezhizao\Documents\Virtual Machines\3.0\unlocker-3.0.2\backup\x64\vmware-vmx-debug.exe
19
1 File(s) copied
20
C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe -> D:\yuangezhizao\Documents\Virtual Machines\3.0\unlocker-3.0.2\backup\x64\vmware-vmx-stats.exe
21
1 File(s) copied
22
C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll -> D:\yuangezhizao\Documents\Virtual Machines\3.0\unlocker-3.0.2\backup\vmwarebase.dll
23
1 File(s) copied
24
25
Patching...
26
File: C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe
27
28
appleSMCTableV0 (smc.version = "0")
29
appleSMCTableV0 Address      : 0xab4150
30
appleSMCTableV0 Private Key #: 0xF2/242
31
appleSMCTableV0 Public Key  #: 0xF0/240
32
appleSMCTableV0 Table        : 0xab4170
33
+LKS Key:
34
002 0xab41b8 +LKS 01 flag 0x90 0x140167c70L 07
35
OSK0 Key Before:
36
241 0xab84f0 OSK0 32 ch8* 0x80 0x140167cf0L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
37
OSK0 Key After:
38
241 0xab84f0 OSK0 32 ch8* 0x80 0x140167c70L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
39
OSK1 Key Before:
40
242 0xab8538 OSK1 32 ch8* 0x80 0x140167cf0L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
41
OSK1 Key After:
42
242 0xab8538 OSK1 32 ch8* 0x80 0x140167c70L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
43
44
appleSMCTableV1 (smc.version = "1")
45
appleSMCTableV1 Address      : 0xab8580
46
appleSMCTableV1 Private Key #: 0x01B4/436
47
appleSMCTableV1 Public Key  #: 0x01B0/432
48
appleSMCTableV1 Table        : 0xab85a0
49
+LKS Key:
50
004 0xab8678 +LKS 01 flag 0x90 0x140167c70L 01
51
OSK0 Key Before:
52
435 0xabffb0 OSK0 32 ch8* 0x90 0x140167cf0L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
53
OSK0 Key After:
54
435 0xabffb0 OSK0 32 ch8* 0x90 0x140167c70L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
55
OSK1 Key Before:
56
436 0xabfff8 OSK1 32 ch8* 0x90 0x140167cf0L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
57
OSK1 Key After:
58
436 0xabfff8 OSK1 32 ch8* 0x90 0x140167c70L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
59
60
File: C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe
61
62
appleSMCTableV0 (smc.version = "0")
63
appleSMCTableV0 Address      : 0xcbda60
64
appleSMCTableV0 Private Key #: 0xF2/242
65
appleSMCTableV0 Public Key  #: 0xF0/240
66
appleSMCTableV0 Table        : 0xcbda80
67
+LKS Key:
68
002 0xcbdac8 +LKS 01 flag 0x90 0x14019fa20L 07
69
OSK0 Key Before:
70
241 0xcc1e00 OSK0 32 ch8* 0x80 0x14019fc00L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
71
OSK0 Key After:
72
241 0xcc1e00 OSK0 32 ch8* 0x80 0x14019fa20L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
73
OSK1 Key Before:
74
242 0xcc1e48 OSK1 32 ch8* 0x80 0x14019fc00L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
75
OSK1 Key After:
76
242 0xcc1e48 OSK1 32 ch8* 0x80 0x14019fa20L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
77
78
appleSMCTableV1 (smc.version = "1")
79
appleSMCTableV1 Address      : 0xcc1e90
80
appleSMCTableV1 Private Key #: 0x01B4/436
81
appleSMCTableV1 Public Key  #: 0x01B0/432
82
appleSMCTableV1 Table        : 0xcc1eb0
83
+LKS Key:
84
004 0xcc1f88 +LKS 01 flag 0x90 0x14019fa20L 01
85
OSK0 Key Before:
86
435 0xcc98c0 OSK0 32 ch8* 0x90 0x14019fc00L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
87
OSK0 Key After:
88
435 0xcc98c0 OSK0 32 ch8* 0x90 0x14019fa20L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
89
OSK1 Key Before:
90
436 0xcc9908 OSK1 32 ch8* 0x90 0x14019fc00L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
91
OSK1 Key After:
92
436 0xcc9908 OSK1 32 ch8* 0x90 0x14019fa20L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
93
94
File: C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe
95
96
appleSMCTableV0 (smc.version = "0")
97
appleSMCTableV0 Address      : 0xaec4c0
98
appleSMCTableV0 Private Key #: 0xF2/242
99
appleSMCTableV0 Public Key  #: 0xF0/240
100
appleSMCTableV0 Table        : 0xaec4e0
101
+LKS Key:
102
002 0xaec528 +LKS 01 flag 0x90 0x1401718d0L 07
103
OSK0 Key Before:
104
241 0xaf0860 OSK0 32 ch8* 0x80 0x140171950L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
105
OSK0 Key After:
106
241 0xaf0860 OSK0 32 ch8* 0x80 0x1401718d0L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
107
OSK1 Key Before:
108
242 0xaf08a8 OSK1 32 ch8* 0x80 0x140171950L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
109
OSK1 Key After:
110
242 0xaf08a8 OSK1 32 ch8* 0x80 0x1401718d0L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
111
112
appleSMCTableV1 (smc.version = "1")
113
appleSMCTableV1 Address      : 0xaf08f0
114
appleSMCTableV1 Private Key #: 0x01B4/436
115
appleSMCTableV1 Public Key  #: 0x01B0/432
116
appleSMCTableV1 Table        : 0xaf0910
117
+LKS Key:
118
004 0xaf09e8 +LKS 01 flag 0x90 0x1401718d0L 01
119
OSK0 Key Before:
120
435 0xaf8320 OSK0 32 ch8* 0x90 0x140171950L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
121
OSK0 Key After:
122
435 0xaf8320 OSK0 32 ch8* 0x90 0x1401718d0L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
123
OSK1 Key Before:
124
436 0xaf8368 OSK1 32 ch8* 0x90 0x140171950L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
125
OSK1 Key After:
126
436 0xaf8368 OSK1 32 ch8* 0x90 0x1401718d0L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
127
128
GOS Patching: C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll
129
GOS Patched flag @: 0x4fa2e8
130
GOS Patched flag @: 0x4fa328
131
GOS Patched flag @: 0x4fa368
132
GOS Patched flag @: 0x4fa3a8
133
GOS Patched flag @: 0x4fa3e8
134
GOS Patched flag @: 0x4fa428
135
GOS Patched flag @: 0x4fa468
136
GOS Patched flag @: 0x4fa4a8
137
GOS Patched flag @: 0x4fa4e8
138
GOS Patched flag @: 0x4fa528
139
GOS Patched flag @: 0x4fa568
140
GOS Patched flag @: 0x4fa5a8
141
GOS Patched flag @: 0x4fa5e8
142
GOS Patched flag @: 0x590d28
143
GOS Patched flag @: 0x590d68
144
GOS Patched flag @: 0x590da8
145
GOS Patched flag @: 0x590de8
146
GOS Patched flag @: 0x590e28
147
GOS Patched flag @: 0x590e68
148
GOS Patched flag @: 0x590ea8
149
GOS Patched flag @: 0x590ee8
150
GOS Patched flag @: 0x590f28
151
GOS Patched flag @: 0x590f68
152
GOS Patched flag @: 0x590fa8
153
GOS Patched flag @: 0x590fe8
154
GOS Patched flag @: 0x591028
155
GOS Patched: C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll
156
157
Getting VMware Tools...
158
Retrieving Darwin tools from: http://softwareupdate.vmware.com/cds/vmw-desktop/fusion/11.5.1/15018442/packages/com.vmware.fusion.tools.darwin.zip.tar
159
Traceback (most recent call last):
160
  File "gettools.py", line 159, in <module>
161
    main()
162
  File "gettools.py", line 112, in main
163
    tar = tarfile.open(convertpath(dest + '/tools/com.vmware.fusion.tools.darwin.zip.tar'), 'r')
164
  File "tarfile.py", line 1680, in open
165
tarfile.ReadError: file could not be opened successfully
166
[2256] Failed to execute script gettools
167
File not found - darwin*.*
168
0 File(s) copied
169
170
Starting VMware services...
171
172
Finished!

比较遗憾的是,并没有从fusion中成功下载得到com.vmware.fusion.tools.darwin.zip.tar……

0x01.导入

打开
打开
果然恢复了大小
果然恢复了大小
经过一段时间的等待就导入完成了
经过一段时间的等待就导入完成了
果然还是失败了
果然还是失败了

顺便一提:本地更新不能,于是去官网下载结果发现还需要注册,过草……

下载麻烦到爆
下载麻烦到爆

未完待续……