接着昨天继续搞(圣诞节警告

0x00.前言

大佬组的ESXI最近遇到了一个问题——硬盘炸了,其实印象里早在前一阵子就貌似在日志里看到过硬盘的警告……
但是并没有过于在意于是就暂时放下了,但是最近一次重启(为了给ESXI打上unlocker补丁)之后wz说他的虚拟机开机之后全?炸了(黑群晖、DebianEVE)……
怀疑是某块500 GB硬盘的锅于是立即挂起全部虚拟机,把硬盘插到台式上进行磁盘检查(还拿走了本人的U盘被迫作成PE),扫描还没到5 min就看到了前面的数十个坏道点,过草……

草

近期,tb搞了块60块钱左右的硬盘先凑合用,年后准备把这套卖掉之后组建更高性能的(预计5K
然后,趁着旧硬盘还没彻底报废赶紧在web端进行导出,这里导出了仨文件:macOS.ovfmacOS.mfdisk-0.vmdk
比较有意思的是disk-0.vmdk占用33.3 GB而实际存储的macOS.vmdk可是有44.92 GB……
然后,打了一份快照备用之后在数据存储浏览器中立即进行数据迁移,没错,VMs就是那块「一副要死的样子」的硬盘……

VMs
VMs

终于挪完地方了~

任务目标启动者已排队时间启动时间结果完成时间
Copy Datastore Fileroot2019/12/25 19:04:152019/12/25 19:04:15成功完成2019/12/25 20:31:21

0x01.Unlocker

gh上原版的Unlocker应该是找不到了,只找到了其他仓库,最开始接触这玩楞应该是大一大二那时候,连py还都不会呢
三四年后的今天,也能看个大概这个补丁的原理了,除了替换之外还去官网下载com.vmware.fusion.tools.darwin.zip.tar文件
这样Unlocker文件的作用也大概搞懂了(

先结束这四个进程
先结束这四个进程

以管理员权限运行:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
C:\Windows\System32>"D:\yuangezhizao\Documents\Virtual Machines\unlocker-3.0.2\win-install.cmd"

Unlocker 3.0.2 for VMware Workstation
=====================================
(c) Dave Parsons 2011-18

Set encoding parameters...
Active code page: 850

VMware is installed at: C:\Program Files (x86)\VMware\VMware Workstation\
VMware product version: 15.1.0.13591040

Stopping VMware services...

Backing up files...
C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe -> D:\yuangezhizao\Documents\Virtual Machines\3.0\unlocker-3.0.2\backup\x64\vmware-vmx.exe
1 File(s) copied
C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe -> D:\yuangezhizao\Documents\Virtual Machines\3.0\unlocker-3.0.2\backup\x64\vmware-vmx-debug.exe
1 File(s) copied
C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe -> D:\yuangezhizao\Documents\Virtual Machines\3.0\unlocker-3.0.2\backup\x64\vmware-vmx-stats.exe
1 File(s) copied
C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll -> D:\yuangezhizao\Documents\Virtual Machines\3.0\unlocker-3.0.2\backup\vmwarebase.dll
1 File(s) copied

Patching...
File: C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe

appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xab4150
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xab4170
+LKS Key:
002 0xab41b8 +LKS 01 flag 0x90 0x140167c70L 07
OSK0 Key Before:
241 0xab84f0 OSK0 32 ch8* 0x80 0x140167cf0L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK0 Key After:
241 0xab84f0 OSK0 32 ch8* 0x80 0x140167c70L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xab8538 OSK1 32 ch8* 0x80 0x140167cf0L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK1 Key After:
242 0xab8538 OSK1 32 ch8* 0x80 0x140167c70L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xab8580
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xab85a0
+LKS Key:
004 0xab8678 +LKS 01 flag 0x90 0x140167c70L 01
OSK0 Key Before:
435 0xabffb0 OSK0 32 ch8* 0x90 0x140167cf0L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK0 Key After:
435 0xabffb0 OSK0 32 ch8* 0x90 0x140167c70L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xabfff8 OSK1 32 ch8* 0x90 0x140167cf0L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK1 Key After:
436 0xabfff8 OSK1 32 ch8* 0x90 0x140167c70L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe

appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xcbda60
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xcbda80
+LKS Key:
002 0xcbdac8 +LKS 01 flag 0x90 0x14019fa20L 07
OSK0 Key Before:
241 0xcc1e00 OSK0 32 ch8* 0x80 0x14019fc00L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK0 Key After:
241 0xcc1e00 OSK0 32 ch8* 0x80 0x14019fa20L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xcc1e48 OSK1 32 ch8* 0x80 0x14019fc00L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK1 Key After:
242 0xcc1e48 OSK1 32 ch8* 0x80 0x14019fa20L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xcc1e90
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xcc1eb0
+LKS Key:
004 0xcc1f88 +LKS 01 flag 0x90 0x14019fa20L 01
OSK0 Key Before:
435 0xcc98c0 OSK0 32 ch8* 0x90 0x14019fc00L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK0 Key After:
435 0xcc98c0 OSK0 32 ch8* 0x90 0x14019fa20L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xcc9908 OSK1 32 ch8* 0x90 0x14019fc00L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK1 Key After:
436 0xcc9908 OSK1 32 ch8* 0x90 0x14019fa20L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe

appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xaec4c0
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xaec4e0
+LKS Key:
002 0xaec528 +LKS 01 flag 0x90 0x1401718d0L 07
OSK0 Key Before:
241 0xaf0860 OSK0 32 ch8* 0x80 0x140171950L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK0 Key After:
241 0xaf0860 OSK0 32 ch8* 0x80 0x1401718d0L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xaf08a8 OSK1 32 ch8* 0x80 0x140171950L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK1 Key After:
242 0xaf08a8 OSK1 32 ch8* 0x80 0x1401718d0L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xaf08f0
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xaf0910
+LKS Key:
004 0xaf09e8 +LKS 01 flag 0x90 0x1401718d0L 01
OSK0 Key Before:
435 0xaf8320 OSK0 32 ch8* 0x90 0x140171950L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK0 Key After:
435 0xaf8320 OSK0 32 ch8* 0x90 0x1401718d0L 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xaf8368 OSK1 32 ch8* 0x90 0x140171950L 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
OSK1 Key After:
436 0xaf8368 OSK1 32 ch8* 0x90 0x1401718d0L 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

GOS Patching: C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll
GOS Patched flag @: 0x4fa2e8
GOS Patched flag @: 0x4fa328
GOS Patched flag @: 0x4fa368
GOS Patched flag @: 0x4fa3a8
GOS Patched flag @: 0x4fa3e8
GOS Patched flag @: 0x4fa428
GOS Patched flag @: 0x4fa468
GOS Patched flag @: 0x4fa4a8
GOS Patched flag @: 0x4fa4e8
GOS Patched flag @: 0x4fa528
GOS Patched flag @: 0x4fa568
GOS Patched flag @: 0x4fa5a8
GOS Patched flag @: 0x4fa5e8
GOS Patched flag @: 0x590d28
GOS Patched flag @: 0x590d68
GOS Patched flag @: 0x590da8
GOS Patched flag @: 0x590de8
GOS Patched flag @: 0x590e28
GOS Patched flag @: 0x590e68
GOS Patched flag @: 0x590ea8
GOS Patched flag @: 0x590ee8
GOS Patched flag @: 0x590f28
GOS Patched flag @: 0x590f68
GOS Patched flag @: 0x590fa8
GOS Patched flag @: 0x590fe8
GOS Patched flag @: 0x591028
GOS Patched: C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll

Getting VMware Tools...
Retrieving Darwin tools from: http://softwareupdate.vmware.com/cds/vmw-desktop/fusion/11.5.1/15018442/packages/com.vmware.fusion.tools.darwin.zip.tar
Traceback (most recent call last):
File "gettools.py", line 159, in <module>
main()
File "gettools.py", line 112, in main
tar = tarfile.open(convertpath(dest + '/tools/com.vmware.fusion.tools.darwin.zip.tar'), 'r')
File "tarfile.py", line 1680, in open
tarfile.ReadError: file could not be opened successfully
[2256] Failed to execute script gettools
File not found - darwin*.*
0 File(s) copied

Starting VMware services...

Finished!

比较遗憾的是,并没有从fusion中成功下载得到com.vmware.fusion.tools.darwin.zip.tar……

0x01.导入

打开
打开
果然恢复了大小
果然恢复了大小
经过一段时间的等待就导入完成了
经过一段时间的等待就导入完成了
果然还是失败了
果然还是失败了

顺便一提:本地更新不能,于是去官网下载结果发现还需要注册,过草……

下载麻烦到爆
下载麻烦到爆

未完待续……