【搬运】通过社区软件手动获取一般BD解密秘钥的方法及抓取流程

2025

07-04

更新了一个命令,以保证可以验证 UHD 或者 BEE 的 VUK

08-08

修正了关于 LibreDrive 的相关表述。

08-18

更新了一个适用于 Windows 系统的一键解密 Python 脚本,可支持从实体光驱直接计算密钥或者读取运行目录下的单个或多个由 MakeMKV 生成的 tar/tgz 文件并计算密钥。

写在前面

本教程旨在帮助用户不花一分钱解密由最新的 AACS v82 加密的 BD 而无需等待 keydb 更新或者MakeMKV正式支持 AACS v82。本教程是基于 TSDM 上的相关帖子进行改写以支持最新版的 AACS v82 解密,同时可以利用 BlurayTestAndDecrypt 抽取 MGVC 和 3D 的 BDISO

如果你嫌该教程麻烦,请直接购买 Xreveal 并升级至 2.7.7.3 beta 版本。

特别鸣谢以下相关帖子的大佬们:

前期准备

需要准备清单如下

  1. 一台蓝光光驱(如果仅解密普通BD,理论上任何一台支持蓝光的光驱都可以,如果光驱支持 Libredrive 更好,可以访问 UHD BD,当然由于 UHD BD 的相关性质,本贴无法对 UHD BD 进行解密,支持 Libredrive 的光驱请自行翻阅 MakeMKV 论坛)
  2. FindVUK,下载地址:FindVUK tool - get VUK of all Blurays supported by DVDfab applications 【Doom9】
  3. RDKfromMMKV,下载地址:Get Blu-ray VID and RDK from MakeMKV 【Doom9】
  4. 一个提供各个版本 Device Key 的大佬写的帖子(似乎都是基于PS3提取的),帖子链接(以后新版本 AACS 的 Device Key 也有可能发在这里,自己多看看就好):PlayStation 3 【Doom9】

下载并解压上述文件到你习惯的文件夹即可(RDKfromMMKV.exe 可以和 FindVUK 放一起)

本教程为了防止之前残留的各种缓存影响最终的解密效果,用了一台老旧的电脑进行演示。

注:请首先下载该网址的 keydb 以确保你的 BD 确实没有 Key,如果在下列网址中已经有对应的 keydb,则无需下列的任何解密操作,只需把文件丢到 MakeMKV 的文件夹中即可,文件夹地址如下

C:\Users\{Your_Username}\.MakeMKV

正式开始

在开始之前,先用一张 AACS v82 的碟尝试一下 MakeMKV 1.17.9 能否解密,结果如下图所示,显然是解密不了的,这张并不是 UHD BD(谁家UHD BD才0.46G啊)。

现在开始正式进入解密流程

首先,我们找到 RDKfromMMKV,利用该软件提取 VID 和 DiscID(如果你发现该软件无法获取 VID 和 DiscID,那可能该软件不支持你的光驱,最稳妥的方法就是换成支持 Libredrive 的光驱),输入如下指令(X代表你的光驱卷标)

RDKfromMMKV X:

输出结果如下(我的光驱卷标是K)

C:\Users\ASUS\Desktop\FindVUK_1.82>RDKfromMMKV K:
-----------------------------------------------------------
13:42:39 - ----------- RDKfromMMKV 0.05 -----------
-----------------------------------------------------------
13:42:39 - Specified drive: K
13:42:39 - Drive >K< is BusEncryptionCapable
13:42:39 - Disc in drive >K< is BusEncryptionEnabled
13:42:39 - Drive is BEC and disc is BEE - so continue to get the RDK from MakeMKV :)
13:42:39 - MakeMKV is installed :)
13:42:39 - MakeMKV has no license key - please visit >https://forum.makemkv.com/forum/viewtopic.php?t=1053< to get the current key
13:42:39 - MakeMKVcon path: C:\Program Files (x86)\MakeMKV\MakeMKVcon.exe
13:42:42 - Drivenumber is >1<
13:42:52 - discatt.dat appeared - kill MakeMKVcon now
13:42:53 - Target file >C:\Users\ASUS\AppData\Local\Temp\RDKfromMMKV_20250331_134242\discatt.dat<
13:42:53 - DriveId >1F8A37CB9759F44C61A5277E83A60930D32E5E76<
13:42:53 - VolumeId >7CF1D77D925EC0CFAF73883FB7D62D13<
13:42:53 - ReadDataKey >EC631D2E9E8023913A450EC32F77F15E<
13:42:53 - DiscId >1408606894CF0C488185BC9FCB95537B8AD522CF<
13:42:53 - RDK cache will be created >C:\Users\ASUS\AppData\Roaming\aacs\rdk\1f8a37cb9759f44c61a5277e83a60930d32e5e76\1408606894cf0c488185bc9fcb95537b8ad522cf<
13:42:53 - Created the RDK cache file!
13:42:53 - KeyDB path >C:\Users\ASUS\AppData\Roaming\aacs\keydb.cfg<
13:42:53 - VID cache will be created >C:\Users\ASUS\AppData\Roaming\aacs\vid\1408606894cf0c488185bc9fcb95537b8ad522cf<
13:42:53 - Created the VID cache file!

你可以发现两个值,VolumeId 和 DiscId,这对应着上面写的 VID 和 DiscID,记住他们

之后需要对 aacskeys 进行一下初始化,生成 ProcessingDeviceKeysSimple.txt,进入 FindVUK 所在的文件夹,运行如下命令(X代表你的光驱卷标)

FindVUK aacskeys=X

输出结果如下(遇到选择语言的话默认按 enter 就行了)

C:\Users\ASUS\Desktop\FindVUK_1.82>FindVUK aacskeys=K
-----------------------------------------------------------
13:52:56 - ----------- FindVUK 1.82 -----------
-----------------------------------------------------------
To close FindVUK simply press the ESC key
-----------------------------------------------------------
13:52:56 - MODE: AACSkeys

13:52:56 - DriveLetter : K

13:52:56 - SettingsFile: >C:\Users\ASUS\Desktop\FindVUK_1.82\config\FindVUK.ini<
13:52:56 - Settingsfile does not exist - create it with default values
13:52:56 - Logfile >C:\Users\ASUS\Desktop\FindVUK_1.82\log\2025-03-31_FindVUK.txt< Default Loglevel >2<
13:52:56 - Update enabled - check for update
13:52:56 - No update required
13:52:56 - Please check if the following language is correct.

Common values are:
bul=Bulgarian cat=Catalan dan=Danish deu=German ell=Greek eng=English
fin=Finnish fra=French heb=Hebrew isl=Icelandic ita=Italian jpn=Japanese
kor=Korean nld=Dutch nor=Norwegian por=Portuguese ron=Romanian rus=Russian
spa=Spanish swe=Swedish tha=Thai zho=Chinese

Language > ng<
13:52:58 - Open Main-KEYDB file: >C:\Users\ASUS\AppData\Roaming\aacs\KEYDB.cfg<
13:52:58 - Open Backup-KEYDB file: >C:\Users\ASUS\Desktop\FindVUK_1.82\VUKbackup\KEYDB.cfg<
13:52:58 - Driveletter for AACSkeys set to >K<

###############################################################################
13:52:58 - --- PART 1 --- GET AACSKEYS DATA ---
-------------------------------------------------------------------------------

-------------------------------------------------------------------------------
13:52:58 - Get basic AACS data
-------------------------------------------------------------------------------
13:52:58 - AACS folder on disc is reachable - Validate is possible
13:53:04 - Different VolumeName detected - most likely the disc has been changed... take the new name
13:53:04 - VolumeName >BD_ROM<
13:53:04 - DiscId >1408606894CF0C488185BC9FCB95537B8AD522CF< (2025-02-04)
13:53:04 - DiscType >BD<
13:53:04 - MKB Revision >82<
13:53:04 - Disc-BusEncEnabled >1<
13:53:04 - Drve-BusEncCapable >1<
13:53:04 - ==> Bus Encryption active!
13:53:04 - UnitKeyCount >1<
13:53:04 - >>> UnitKeyENC (1) >81D086C25DC97700B5EA1D318BE9F8C3<
-------------------------------------------------------------------------------
13:53:04 - BusEncryption enabled => either ReadDataKey or disabling of BusEncryption required
-------------------------------------------------------------------------------
13:53:04 - Try to read ReadDataKey from RDK cache
13:53:04 - RDK found in cache!
13:53:04 - ReadDataKey >ec631d2e9e8023913a450ec32f77f15e<
-------------------------------------------------------------------------------
13:53:04 - --- PART 2 --- VALIDATE VUK/UNITKEYS ---
-------------------------------------------------------------------------------
13:53:04 - Information: no bdmv-meta-dl directory available on disc - cannot read meta-title
13:53:04 - Drive is detected as 'REAL BLURAY' drive
13:53:04 - M2TS files found >4<
13:53:04 - ERROR! Validation of VUK failed >#BRAACS_ListError<

Please press ENTER or ESC to exit

之后进入aacskeys文件夹,会发现里面多了一个 ProcessingDeviceKeysSimple.txt,在修改他之前,我们需要找到 AACS v82 的 Device Key,在之前提到的 Doom9 论坛中,PS3 的帖子中,第59楼提供了如下格式的Device Key

| DK | DEVICE_KEY 0x7C06DEAE7F49B551DAF538C8CF1811C9 | DEVICE_NODE 0x0E20 | KEY_UV 0x00000E23 | KEY_U_MASK_SHIFT 0x02 ; MKBv82-...

其中的 7C06DEAE7F49B551DAF538C8CF1811C9 就是我们需要的 Device Key,之后我们就可以根据这个 Key 改写 ProcessingDeviceKeysSimple.txt 如下

38841673E2B4E05191659899606CFFB8 ; DK - MKBv49-MKBv71
5FB86EF127C19C171E799F61C27BDC2A ; DK - MKBv01-MKBv48
861B3719B02F24BE6F1A30E2E3ABEE94 ; DK - MKBv72-MKBv81
7C06DEAE7F49B551DAF538C8CF1811C9; DK - MKBv82-...
3B323C7A9AFC0921831D247239823DE6 ; PK - MKBv64-MKBv65
76DDD7093216D28C15049A6B9C5C18B9 ; PK - MKBv63
7A4F40D8696B7B159BE8176CC9EDB85C ; PK - MKBv66-MKBv68

在更新完对应的文件之后,在 aacskeys 文件夹中,打开命令行,输入如下命令,即可计算得到你这张碟对应的各项 Keys(X代表卷标,{VID} 代表前面得到的 VolumeId)

aacskeys -va X {VID}

输出如下

aacskeys -va K 7CF1D77D925EC0CFAF73883FB7D62D13
aacskeys 0.4.0f by arnezami, KenD00, Key, Nobu1789, anon

Current path: C:\Users\ASUS\Desktop\FindVUK_1.82\aacsk
eys

MKBv: 82
Device key: 7C06DEAE7F49B551DAF538C8CF1811C9
Processing key: BA987C436C92DA261C5AFD1DE7DAF4D1
Encrypted C-value: DD310C3B09BF29B15807AB4F7FC1074F
Corresponding uv: 00000E23

Decrypted C-value: C2CE82D74F1C39B79B00174FEBEB3585
Media key: C2CE82D74F1C39B79B00174FEBEB3BA6

Encrypted verification data: 39DD06DC8E865BFAA00AFB348E83DFB8
Decr verif data should be: 0123456789ABCDEF
Decrypted verification data: 0123456789ABCDEFA08B6DCECC854928

Volume ID (EXTERNAL): 7CF1D77D925EC0CFAF73883FB7D62D13

Volume Unique Key: 3B8663E27CC60FA9C839942AE7BD0102
Unit Key File Hash (Disc ID): 1408606894CF0C488185BC9FCB95537B8AD522CF

Encrypted Unit Key 1: 81D086C25DC97700B5EA1D318BE9F8C3

Decrypted Unit Key 1: 04623ABC169B4E088BCB20E33053977C

记住上面输出的 Volume Unique Key (VUK) 和 Media Key

至此,我们获得了如下内容,用于构建解密的 Keys

VID: 7CF1D77D925EC0CFAF73883FB7D62D13
Disc ID: 1408606894CF0C488185BC9FCB95537B8AD522CF
VUK: 3B8663E27CC60FA9C839942AE7BD0102
Media Key: C2CE82D74F1C39B79B00174FEBEB3BA6

最后,我们根据如下格式生成对应的解密 Keys,{BDName} 就是你BD的卷名,{DATE} 可以文件夹形式打开BD然后看上面的创建时间

0x{Disc ID} = {BDName} | D | {DATE} | M | 0x{Media key} | I | 0x{VID} | V | 0x{VUK}

比如我上述得到的Keys如下

0x1408606894CF0C488185BC9FCB95537B8AD522CF = BD_ROM | D | 2025-02-07 | M | 0xC2CE82D74F1C39B79B00174FEBEB3BA6 | I | 0x7CF1D77D925EC0CFAF73883FB7D62D13 | V | 0x3B8663E27CC60FA9C839942AE7BD0102

把他写入到如下文件夹中的 keydb.cfg(随便在末尾另起一行即可)

C:\Users\{Your_Username}\AppData\Roaming\aacs

之后回到 FindVUK 文件夹中,验证一下 Key(X是卷标)

FindVUK validateDisc drive=X

输出如下,说明通过我们的 Keys 同时计算出来了 UK,并上传了 keydb 的在线数据库,以后别人就可以拿我的 key 直接解密对应的BD

C:\Users\ASUS\Desktop\FindVUK_1.82>FindVUK validateDisc drive=K
-----------------------------------------------------------
14:36:45 - ----------- FindVUK 1.82 -----------
-----------------------------------------------------------
To close FindVUK simply press the ESC key
-----------------------------------------------------------
14:36:45 - MODE: ValidateDisc

14:36:45 - DriveLetter : K

14:36:45 - SettingsFile: >C:\Users\ASUS\Desktop\FindVUK_1.82\config\FindVUK.ini<
14:36:45 - Logfile >C:\Users\ASUS\Desktop\FindVUK_1.82\log\2025-03-31_FindVUK.txt< Default Loglevel >2<
14:36:45 - Open Main-KEYDB file: >C:\Users\ASUS\AppData\Roaming\aacs\KEYDB.cfg<
14:36:45 - Open Backup-KEYDB file: >C:\Users\ASUS\Desktop\FindVUK_1.82\VUKbackup\KEYDB.cfg<
-------------------------------------------------------------------------------
14:36:45 - Get basic AACS data
-------------------------------------------------------------------------------
14:36:45 - AACS folder on disc is reachable - Validate is possible
14:36:49 - VolumeName >BD_ROM<
14:36:49 - DiscId >1408606894CF0C488185BC9FCB95537B8AD522CF< (2025-02-04)
14:36:49 - DiscType >BD<
14:36:49 - MKB Revision >82<
14:36:49 - Disc-BusEncEnabled >1<
14:36:49 - Drve-BusEncCapable >1<
14:36:49 - ==> Bus Encryption active!
14:36:49 - UnitKeyCount >1<
14:36:49 - >>> UnitKeyENC (1) >81D086C25DC97700B5EA1D318BE9F8C3<
14:36:49 - Data read from KeyDB.cfg:
14:36:49 - VolumeId: 7CF1D77D925EC0CFAF73883FB7D62D13
14:36:49 - MediaKey: C2CE82D74F1C39B79B00174FEBEB3BA6
14:36:49 - VUK: 3B8663E27CC60FA9C839942AE7BD0102
14:36:49 - UnitKeys (1):
14:36:49 - UnitKeys recalculated with VUK:
14:36:49 - UnitKeyCount >1<
14:36:49 - >>> UnitKeyDEC (1) >04623ABC169B4E088BCB20E33053977C<
-------------------------------------------------------------------------------
14:36:49 - BusEncryption enabled => either ReadDataKey or disabling of BusEncryption required
-------------------------------------------------------------------------------
14:36:49 - Try to read ReadDataKey from RDK cache
14:36:49 - RDK found in cache!
14:36:49 - ReadDataKey >ec631d2e9e8023913a450ec32f77f15e<
-------------------------------------------------------------------------------
14:36:49 - --- PART 2 --- VALIDATE VUK/UNITKEYS ---
-------------------------------------------------------------------------------
14:36:49 - Information: no bdmv-meta-dl directory available on disc - cannot read meta-title
14:36:49 - Drive is detected as 'REAL BLURAY' drive
14:36:49 - M2TS files found >4<
14:36:49 - Decrypted first unit of file >K:\BDMV\STREAM\00000.m2ts< with UnitKey >1<
14:36:49 - All UnitKeys are VALID! No need to test other files

-------------------------------------------------------------------------------
14:36:49 - Validation successful! UnitKeys are valid!!
-------------------------------------------------------------------------------

14:36:49 - MediaKey and VolumeID match VUK!
14:36:49 - ReadDataKey file created
14:36:49 - -------------------------------------------------------
14:36:49 - VolumeName : BD_ROM
14:36:49 - DiscID : 1408606894CF0C488185BC9FCB95537B8AD522CF
14:36:49 - DateDiscID : 2025-02-04
14:36:49 - DiscType : BD
14:36:49 - VUK : 3B8663E27CC60FA9C839942AE7BD0102
14:36:49 - MEDIAKEY : C2CE82D74F1C39B79B00174FEBEB3BA6
14:36:49 - VOLUMEID : 7CF1D77D925EC0CFAF73883FB7D62D13
14:36:49 - >>> UnitKeyDEC (1) >04623ABC169B4E088BCB20E33053977C< (Valid)
14:36:49 - MKBrev : 82
14:36:49 - BusEncrEn : 1
14:36:49 - AACS : 1
14:36:49 - BD+ : 0
14:36:49 - -------------------------------------------------------


-------------------------------------------------------------------------------
14:36:49 - --- Write entry in main-keydb file ---
-------------------------------------------------------------------------------

14:36:49 - Keys in Keyfile: 1 keys - KeyFile: C:\Users\ASUS\AppData\Roaming\aacs\KEYDB.cfg
14:36:49 - Disc with ID >1408606894CF0C488185BC9FCB95537B8AD522CF< is already in file - need to compare the details

14:36:49 - KEYDB: Nearly identical entry already present in keydb-file
14:36:49 - >> Identical: TITLE, VUK, MEDIAKEY, VOLUMEID - Different: DATE, UNITKEYS, COMMENT >> write new entry in keydb-file

14:36:49 - Added line with VUK/UnitKeys to file >C:\Users\ASUS\AppData\Roaming\aacs\KEYDB.cfg<


-------------------------------------------------------
14:36:49 - --- Write entry in backup-keydb file ---
-------------------------------------------------------

14:36:49 - KEYDB: file >C:\Users\ASUS\Desktop\FindVUK_1.82\VUKbackup\KEYDB.cfg< does not exist ==>> write new entry in keydb-file

14:36:49 - Added line with VUK/UnitKeys to file >C:\Users\ASUS\Desktop\FindVUK_1.82\VUKbackup\KEYDB.cfg<

14:36:49 - -------------------------------------------------------
14:36:49 - --- Upload MetaXML to OnlineDB file ---
14:36:49 - -------------------------------------------------------
Establishing connection
Establishing connection
HTTP-POST success
14:36:50 - Successfully posted to the OnlineDB! >
Preconditions fulfilled - process upload now
Detected BlurayMetaXML - DiscId >1408606894CF0C488185BC9FCB95537B8AD522CF<
Upload written to database!
Meta-Upload successfully processed!
<
14:36:50 - Successful upload to OnlineDB
14:36:51 - Hash file >C:\Users\ASUS\AppData\Roaming\aacs\keydb_fvhash.ini< not available - nothing to update
14:36:51 - Eject the disc now from drive >K:\<

14:36:54 - Successfully ejected the media in drive K!

在完成验证后,可以将 keydb.cfg 复制到 MakeMKV 的文件夹中,即可使用 MakeMKV 解密

C:\Users\{Your_Username}\.MakeMKV

如下图所示,已经成功解密

其他操作

在获取完 Key 以后,如果是 MGVC 或者 3D 碟想保留 ISO?请使用开头提到的帖子中的 BlurayTestAndDecrypt,只需将对应卷标的光驱从资源管理器中拖动到上述软件上即可,之后选择 6,即可先获取一个加密的 ISO 文件(会让你选择一次文件夹),输出如下

-----------------------------------------------------------
14:44:38 - ----------- BlurayTestAndDecrypt 0.94 -----------
-----------------------------------------------------------
14:44:38 - Logfile: C:\Users\ASUS\Desktop\FindVUK_1.82\log\2025-03-31_BlurayTestAndDecrypt.txt
14:44:38 - Update enabled - check for update
14:44:39 - No update required
14:44:39 - Read settings from file >C:\Users\ASUS\Desktop\FindVUK_1.82\BlurayTestAndDecrypt.ini<
14:44:39 - Logfile >C:\Users\ASUS\Desktop\FindVUK_1.82\log\2025-03-31_BlurayTestAndDecrypt.txt<
14:44:39 - >> Mode >0< (Unknown)
14:44:39 - >> DecryptDest ><

14:44:42 - List of files being processed:

14:44:42 - * Drive >K:\<


Please choose the correct mode:
1 ... Test: Simple Test (only check for correct flags)
2 ... Test: Advanced Test (check if all units can be AACS decrypted with VUK)
3 ... ExtractFiles: Decrypt AACS with VUK, repair BD+ with FixUpTable (but stop on AACS decryption error)
4 ... ExtractFiles: Decrypt AACS with VUK, repair BD+ with FixUpTable (and continue on decryption error)
5 ... Display required unitkey for all files
6 ... DumpDrive&Test: Dump drive to ISO file and perform advanced test on ISO
7 ... SpeedTest: Test how fast the drive can read the disc

Insert here : 6



14:45:44 - Mode >11< saved in ini-file
14:45:44 - #############################################################################
14:45:44 - 1/1 - Srcdrive >K:\< Mode >DumpDrive and Test<

14:45:48 - VolumeName: BD_ROM
14:45:51 - DiscID: >1408606894CF0C488185BC9FCB95537B8AD522CF<
14:45:51 - BusDecryption required - ReadDataKey >ec631d2e9e8023913a450ec32f77f15e<
14:45:51 - Collect list of files that need bus-decryption
14:45:52 - Dump drive >K:\< to file >C:\Users\ASUS\Desktop\BD_ROM.iso<- Size >0.46< GB (241920 blocks)
14:45:52 - -----------------------------------------------------------------------------
14:45:53 - Read Blocks > 180/241920< Pct 0.07% - Speed 2.59MB/s / 0.60x Blu-ray speed during last >180< Blocks
中间省略
14:46:45 - Read Blocks >241920/241920< Pct 100.00% - Speed 9.10MB/s / 2.12x Blu-ray speed during last >1225< Blocks
14:46:45 - Duration >0:00:53< - Size >0.46< GB - Average Speed 8.92 MB/s
14:46:45 - Read Blocks >241920/241920< Pct 100.00% - Speed+InfinitMB/s / +Infini Blu-ray speed during last >55< Blocks
14:46:45 - Duration >0:00:53< - Size >0.46< GB - Average Speed 8.92 MB/s
14:46:45 - Successfully dumped drive >K:\< to file >C:\Users\ASUS\Desktop\BD_ROM.iso<
14:46:45 - #############################################################################
14:46:45 - 1/1 100.00% - Check ISO >C:\Users\ASUS\Desktop\BD_ROM.iso< Mode >Test - AdvancedTest<
14:46:45 - VolumeName: BD_ROM
14:46:45 - DiscID: >1408606894CF0C488185BC9FCB95537B8AD522CF<
14:46:45 - Disc is AACS protected - init necessary AACS values
14:46:45 - Use default AACS-KeyDB file >C:\Users\ASUS\AppData\Roaming\aacs\keydb.cfg<
14:46:45 - VUK: >3B8663E27CC60FA9C839942AE7BD0102<
14:46:45 - UnitKeyCnt: 1

14:46:45 - >>> UnitKey: 04623ABC169B4E088BCB20E33053977C

14:46:45 - Disc is not BD+ protected
14:46:45 - Size to decrypt: 0.45 GB
Filename >\BDMV\STREAM\00000.m2ts< Size GB > 0.02< Unit_Enc > 0< Unit_Unenc > 0< Unit_Err > 14:46:45 - Filename >\BDMV\STREAM\00000.m2ts< Size GB > 0.02< Unit_Enc > 2853< Unit_Unenc > 0< Unit_Err > 0< Duration >0:00:00< TSTA
Filename >\BDMV\STREAM\00003.m2ts< Size GB > 0.02< Unit_Enc > 0< Unit_Unenc > 0< Unit_Err > 14:46:45 - Filename >\BDMV\STREAM\00003.m2ts< Size GB > 0.02< Unit_Enc > 4127< Unit_Unenc > 0< Unit_Err > 0< Duration >0:00:00< TSTA
Filename >\BDMV\STREAM\00002.m2ts< Size GB > 0.00< Unit_Enc > 0< Unit_Unenc > 0< Unit_Err > 14:46:45 - Filename >\BDMV\STREAM\00002.m2ts< Size GB > 0.00< Unit_Enc > 585< Unit_Unenc > 0< Unit_Err > 0< Duration >0:00:00< TSTA
Filename >\BDMV\STREAM\00001.m2ts< Size GB > 0.41< Unit_Enc > 0< Unit_Unenc > 0< Unit_Err > Filename >\BDMV\STREAM\00001.m2ts< Size GB > 0.41< Unit_Enc > 10000< Unit_Unenc > 0< Unit_Err > Filename >\BDMV\STREAM\00001.m2ts< Size GB > 0.41< Unit_Enc > 20000< Unit_Unenc > 0< Unit_Err > Filename >\BDMV\STREAM\00001.m2ts< Size GB > 0.41< Unit_Enc > 30000< Unit_Unenc > 0< Unit_Err > Filename >\BDMV\STREAM\00001.m2ts< Size GB > 0.41< Unit_Enc > 40000< Unit_Unenc > 0< Unit_Err > Filename >\BDMV\STREAM\00001.m2ts< Size GB > 0.41< Unit_Enc > 50000< Unit_Unenc > 0< Unit_Err > Filename >\BDMV\STREAM\00001.m2ts< Size GB > 0.41< Unit_Enc > 60000< Unit_Unenc > 0< Unit_Err > Filename >\BDMV\STREAM\00001.m2ts< Size GB > 0.41< Unit_Enc > 70000< Unit_Unenc > 0< Unit_Err > 14:46:48 - Filename >\BDMV\STREAM\00001.m2ts< Size GB > 0.41< Unit_Enc > 71784< Unit_Unenc > 0< Unit_Err > 0< Duration >0:00:02< TSTA

14:46:48 - Duration >0:00:02<
14:46:48 - Files Encrypted >4< - Unencrypted >0< - Error >0<
14:46:48 - Successfully tested ISO file >C:\Users\ASUS\Desktop\BD_ROM.iso<

#############################################################################

14:46:48 - Overall duration >0:01:03<

Please press ENTER or ESC to exit

之后将 ISO 再次拖动到该软件上,选择 5(生成备份文件再解密)或者 6(直接在原文件上解密),即可获得解密过的 ISO,我这里选择 5 来进行解密,输出如下

-----------------------------------------------------------
14:49:09 - ----------- BlurayTestAndDecrypt 0.94 -----------
-----------------------------------------------------------
14:49:09 - Logfile: C:\Users\ASUS\Desktop\FindVUK_1.82\log\2025-03-31_BlurayTestAndDecrypt.txt
14:49:09 - Update enabled - check for update
14:49:09 - No update required
14:49:09 - Read settings from file >C:\Users\ASUS\Desktop\FindVUK_1.82\BlurayTestAndDecrypt.ini<
14:49:09 - Logfile >C:\Users\ASUS\Desktop\FindVUK_1.82\log\2025-03-31_BlurayTestAndDecrypt.txt<
14:49:09 - >> Mode >11< (Dump drive and test-decrypt)
14:49:09 - >> DecryptDest ><

14:49:09 - List of files being processed:

14:49:09 - * File >C:\Users\ASUS\Desktop\BD_ROM.iso<


Please choose the correct mode:
1 ... Test: Simple Test (only check for correct flags)
2 ... Test: Advanced Test (check if all units can be AACS decrypted with VUK)
3 ... ExtractFiles: Decrypt AACS with VUK, repair BD+ with FixUpTable (but stop on AACS decryption error)
4 ... ExtractFiles: Decrypt AACS with VUK, repair BD+ with FixUpTable (and continue on decryption error)
5 ... ISO 2 ISO: Decrypt AACS with VUK, repair BD+ with FixUpTable (but stop on AACS decryption error)
6 ... ISO InPlace: Decrypt AACS with VUK, repair BD+ with FixUpTable (but stop on AACS decryption error)
7 ... Display required unitkey for all files
8 ... Check for Playlist Obfuscation
9 ... Check for Playlist Obfuscation and correct it (might need user input)
10 ... Test: Check if filesystem is valid

Insert here : 5



14:49:13 - Mode >5< saved in ini-file
14:49:13 - #############################################################################
14:49:13 - 1/1 - Decrypt - ISO2ISO >C:\Users\ASUS\Desktop\BD_ROM.iso<
14:49:13 - INFO: currently specified output dir is invalid!
14:49:16 - OutputDir >C:\Users\ASUS\Desktop\< saved in ini-file

14:49:16 - Decrypt OutputDir: C:\Users\ASUS\Desktop\

14:49:16 - UDF - OpenISO
14:49:16 - Initialize Disc now
14:49:16 - VolumeName: BD_ROM
14:49:16 - DiscID: >1408606894CF0C488185BC9FCB95537B8AD522CF<
14:49:16 - Disc is AACS protected - init necessary AACS values
14:49:16 - Use default AACS-KeyDB file >C:\Users\ASUS\AppData\Roaming\aacs\keydb.cfg<
14:49:16 - VUK: >3B8663E27CC60FA9C839942AE7BD0102<
14:49:16 - UnitKeyCnt: 1

14:49:16 - >>> UnitKey: 04623ABC169B4E088BCB20E33053977C

14:49:16 - Disc is not BD+ protected
14:49:16 - Check if disc is PlaylistObfuscation protected
14:49:16 - No PlaylistObfuscation detected!

14:49:16 - Destination file: >C:\Users\ASUS\Desktop\BD_ROM_decrypted.iso< DestinationSize >495452160<
14:49:16 - ++ COPY ++ Pct > 0.00%< StartBlock >00000000< BlockLen >00001000<
14:49:16 - ++ COPY ++ Pct > 0.41%< StartBlock >00001000< BlockLen >00001000<
14:49:16 - ++ COPY ++ Pct > 0.83%< StartBlock >00002000< BlockLen >00000080<
14:49:16 - ++ DECODE ++ Pct > 0.86%< StartBlock >00002080< BlockLen >00008559< File >\BDMV\STREAM\00000.m2ts<
14:49:16 - ++ COPY ++ Pct > 4.40%< StartBlock >00010639< BlockLen >00000017<
14:49:16 - ++ DECODE ++ Pct > 4.40%< StartBlock >00010656< BlockLen >00012381< File >\BDMV\STREAM\00003.m2ts<
14:49:16 - ++ COPY ++ Pct > 9.52%< StartBlock >00023037< BlockLen >00000003<
14:49:16 - ++ DECODE ++ Pct > 9.52%< StartBlock >00023040< BlockLen >00215352< File >\BDMV\STREAM\00001.m2ts<
14:49:21 - ++ COPY ++ Pct > 98.54%< StartBlock >00238392< BlockLen >00000008<
14:49:21 - ++ DECODE ++ Pct > 98.54%< StartBlock >00238400< BlockLen >00001755< File >\BDMV\STREAM\00002.m2ts<
14:49:21 - ++ COPY ++ Pct > 99.27%< StartBlock >00240155< BlockLen >00001000<
14:49:21 - ++ COPY ++ Pct > 99.68%< StartBlock >00241155< BlockLen >00000765<


14:49:21 - All blocks copied into >C:\Users\ASUS\Desktop\BD_ROM_decrypted.iso< - rename AACS folder to BTD! now
14:49:21 - Duration: 0:00:04
14:49:21 - Speed : 104.58 MB / Second

#############################################################################

14:49:21 - Overall duration >0:00:07<

Please press ENTER or ESC to exit

如果你对得到的解密过的 ISO 进行解压,就能得到和 MakeMKV 一样的BDMV文件(除了 BTD! 这个文件夹外可以互相 hash)

如果你想去除区码,可以随便找个破解版的 AnyDVD,虚拟光驱挂载 ISO,然后用 AnyDVD HD 去除区码之后另存为无区码的ISO。

如果在验证 Key 的时候报错,尝试重新使用 aacskeys 生成一下 key,有时候 key 可能会算错(写教程的途中就发现了这个问题)

如果是 UHD 或者其他 BEE 的碟需要验证 key 的话,需要在 config 文件夹最下面的部分补上这个(如果是直接从 doom9 下载的话,等号后面是空的)

Disable_Bus_Encryption_Cmd = "C:\Program Files (x86)\MakeMKV\makemkvcon.exe" info dev:$DRIVE$

来保证绕过 BEE(前提是 LibreDrive),不然就算是正确的 VUK 也会验证错。

Python 脚本 (WIN)

更新一个适用于 Windwos 系统的一键获取解密密钥的 Python 脚本,调用 aacskeys.exe 计算密钥并将密钥写入 .MakeMKV 文件夹和 aacs 文件夹中的 keydb.cfg,同时在运行文件夹中生成一个备份的 keydb.txt。只需安装 Python 运行环境(我使用的是 Python 3.12.2,无需额外安装第三方依赖包)。

注意事项:

  1. 如果选择的是对物理光驱进行解密,请确保在脚本运行完成后重新插入光盘,以免出现异常,并确保这个光驱是唯一一台连接到电脑的光驱;
  2. 如果是对现有的 tar/tgz 文件进行解密,请将压缩文件直接复制到运行目录(可以一次解密多个文件);
  3. 请确保卷标 X 未被占用;
  4. 请手动修改 config.yaml 文件中 makemkvcon.exe 的地址(如果你不是默认安装的话);
  5. 运行 getBDkey.py 以运行中文版(运行 getBDkey_eng.py 以运行英文版)。

运行结果预览: