I then used nano to edit the root password in the shadow file that was now in the /etc folder using nano etc/shadow. tgz file called local.tgz inside which I untar’d too using this command: Once mounted, I copied the state.tgz file to /tmp then untar’d it. Here’s the steps I took to gain access to my ESXI NUC.įirst, I checked the drives on the machine using the lsblk command. Instead I used a bootable Kali USB to mount the ESXI drive and reset the root password to a blank password by editing the shadow file. I didn’t want to risk trying that method because I wasnt sure if it would affect the currently installed VMs and I didn’t have a copy of ESXI with me to do so. Unfortunately, you can no longer boot into single user mode or Service Console to reset the password and VMware suggest you reinstall ESXI to reset the password. Apparently during the training my coworker had set a root password for the install, which was supposedly written down, but was either typed wrong in the notes or fat-fingered while setting it. It’s been over a month since I’ve touched it. Recently I had done some training where we setup ESXI 6.7 on a Intel NUC.
0 Comments
Leave a Reply. |