@ViaHussun I seen your PMs, do not need to send multiple. At most that only make me feel that I been harass. 1 Pm is enough. I will answer when I have time.
Now if the question behind all this is to provoke me to release any executable. It will not happen any time soon.
I would not go into details as then I will received a complain or bann for doing "Flaming or any other inappropriate behavior towards other members is not allowed.".
=========================================================
Introduction.
barney2222's video link is perfect for the type of situation when poc.exe find the key. Nice.
Now lets assume that you do really are interest in knowing what is been done, "How found ECM key?" when poc.exe do not help.
Well only way I know is Brute Force the solution.
Now you want to read:
What is a Brute-force attack:
https://en.wikipedia.org/wiki/Brute-force_attack
The Protocol Use
https://en.wikipedia.org/wiki/Data_Encryption_Standard
The only porpoise of the previous links is to show that understanding what has to be done, requires knowledge witch requires many hours of self learning witch then will allow you to understand a multitude of complex operations.
=============================================================
But you will say in Powervu I has this tool.
You feed a -Log of EMMs- > PVHE > and it output the -Master Key-
Yes Colibri powervu analysis was amazing. Thanks. And latter the implementation of PVHE by anubis_ir was even beautiful.
As a result, most of you has collected the wrong or false Idea that you can do Bruteforce for anything in that simple way. So many of you think where is that tool, so I can do the same in tandberg.
I am sorry to tell you that:
a) Finding the crypt DES Block in Tandberg stream that you can then Find the Clear DES Block is 1 big problem.
b) Now Brute-force a DES Block by itself is another complicated thing.
So in powervu you just ask vplug to record a 20-40meg log of emm. Simple. Finding the DES Clear/Crypt Pair is not that easy. You need to use multiple of other tools to get to the different parts that you need. Just to be able to identify that crypt/clear pair, If you make a simple mistake in the identification, then your many hours to Bruteforce will produce 0 results or Incorrect.
=====================================================
Suggestion.
Before you continue to indirectly ask for a tool. First prove yourself useful by recording a TS file and finding a Valid Clear / Crypt Des Block of information that you then can try to bruteforce.
If you get to that point, then you may be requiring a tool to do Des Brute Force.