...
Maybe there should be a focus on brute forcing the ecm keys,most people have cuda video cards ready to start searching,if a dedicated developer decide to do the leg work.
40.5 West
record
http://s5.dosya.tc/server2/cdcfnu/40.5W_3923_V_7000.rar.html
for thanks record otokoc :thum:
105 West
record
https://cid-cf57d3d23638226a.users.storage.live.com/downloadfiles/V1/Zip?authKey=!ADz6hQwcxIQ51mQ
for thanks record bigredmachine230 :thum:
log
Code:poc 1.5 [Emu] info: FFDecsa parallel mode = 32 [Emu] stream found emm_pid: 1F4 [Emu] stream found pmt pid: 109 [Emu] stream found pcr_pid: 205 [Emu] stream found ecm_pid: 7E4 [Emu] stream found video pid: 205 [Emu] stream found audio pid: 28F [Emu] stream found audio pid: 299 [Emu] stream found audio pid: 2A3 [Emu] got EMM nano tag E0 (EMM_TAG_RECEIVER_ALLOCATION_DESCRIPTOR) for the first time [Emu] got EMM nano tag E4 (EMM_TAG_SECURITY_TABLE_DESCRIPTOR) for the first time [Emu] Keys found in EMM: nano E4 ram keys 0 to F [Emu] Keys found in EMM: nano E4 ram keys 10 to 1F [Emu] Keys found in EMM: nano E4 ram keys 20 to 2F
Digicipher is very different from Tandberg? Is there any hope of breaking it?
if you want to brute force:
(1) brute force the cw with the rainbow table tool (like BISS) -> this gives you the cw
(2) get the E1 nano tag from the 83 table, that was sent during the brute forced cw period -> this will give you the encrypted cw
(3) you now have cw and (des-)encrypted cw, you can assume that the last byte of the des key is 00. now brute force the des key -> this is the ecm key
yes you are right, and I made a mistake, correct it should be:
if you want to brute force:
(1) brute force the cw with the rainbow table tool (like BISS) -> this gives you the cw
(2) get the EE nano tag from the ecm, that was sent during the brute forced cw period -> this will give you the encrypted cw
(3) you now have cw and (des-)encrypted cw, you can assume that the last byte of the des key is 00. now brute force the des key -> this is the ecm key
(1) brute force the cw with the rainbow table tool (like BISS) -> this gives you the cw
(2) get the EE nano tag from the ecm, that was sent during the brute forced cw period -> this will give you the encrypted cw
(3) you now have cw and (des-)encrypted cw, you can assume that the last byte of the des key is 00. now brute force the des key -> this is the ecm key
i get that aswell maybbe 12-15 secs freeze then ok but again more freeze for 12-15 secs , i thought it was just myselfAnyone have freezes on PC aswell? Using progdvb to watch , and every some time ( is not periodical ) have a freez with the error message on vplug " bad checksum " ... Is something normal or fault of my equipment?
i get that aswell maybbe 12-15 secs freeze then ok but again more freeze for 12-15 secs , i thought it was just myself
i'm using ProgDVB And Vplug aswell and i see same " bad checksum " message in Vplug log .
strange problem maybbe someone can answer why it is
yours sound worse than mine
i dont have it very often and its not periodical ... Can be now a bad checksum , then after 10 minutes the next one, then in 1 minute 2 more , then again after 15 minutes etc ... is bit strange , so if anyone have the answer we will be apriciate it