I attached all the CWs keys here
C3 66 38 C6 5D 49 5D 03 #[E] PID:00C9h
57 D9 F7 25 5F AC E5 6B #[O] PID:00C9h
CE 4D E7 11 C0 C9 69 0E #[E] PID:012Dh
44 B6 3C B6 37 CE 65 94 #[O] PID:012DhPID: C9h Crypt8:AD 13 52 AE 9B 81 72 FB [O] Count:4295
PID: C9h Crypt8: D0 CF DE 2B 21 E0 DE 75 [E] Count:3931
PID: C9h Crypt8:0C FF 10 0B 62 89 CC FE [E] Count:3776
PID: C9h Crypt8:F6 50 A9 F2 29 71 CC 44 [E] Count:3736
PID: C9h Crypt8:09 91 3E FB 89 BD D6 3A [O] Count:3712
PID: C9h Crypt8:77 70 C9 30 74 A6 A1 F4 [E] Count:3586
PID: C9h Crypt8: D7 C2 C5 22 AC DB D6 8E [E] Count:3388
PID: C9h Crypt8:CC 1A 54 09 38 E9 A4 CB [O] Count:3281
...
PID: 12Dh Crypt8:67 82 E5 65 FC 97 41 3F [O] Count:3095
PID: 12Dh Crypt8:02 E3 C1 3F 1B 23 4C DF [E] Count:2371
PID: 12Dh Crypt8:B9 76 D9 D5 E9 A5 83 85 [E] Count:2340
PID: 12Dh Crypt8: DF 82 76 B1 F2 94 16 E9 [O] Count:2264
PID: 12Dh Crypt8:7F 72 59 B7 F0 BB 45 FF [O] Count:2219
PID: 12Dh Crypt8:E0 F1 6E A7 E8 6C C2 9E [E] Count:2187
PID: 12Dh Crypt8:E7 F7 B8 01 9B 2B 2C 95 [O] Count:2066
PID: 12Dh Crypt8:76 1B CF 3D 63 C4 8A 15 [O] Count:1969
password will be sent by pm for those who are interested
19 CWs were found :thum: by using V1 and V2 from 20 Crypt8
Regards !!!
intelsat 20
4064 H 19850
CNBC - Tanburg
PID: 550h Crypt8:A8 BB C3 51 B2 F2 60 FE [E] Count:7267
PID: 550h Crypt8:EA E6 F2 46 8E D0 06 8E [E] Count:6673
PID: 550h Crypt8:AD FD F3 E6 A1 F4 CF 1D [O] Count:4747
PID: 550h Crypt8:07 13 73 E7 B6 ED 4C DB [E] Count:4743
all 4 CWs keys were found and sent to your inbox :thum:
please help us and share with us here
Hacking CA system challenge *Tandberg [ NO Keys Allowed in Chat Section/s ]*
Could you show us in details how to use these CWs keys when found from the crypt8 you provided to get the ECM keys ? ...
yes you are right, and I made a mistake, correct it should be:
if you want to brute force:
(1) brute force the cw with the rainbow table tool (like BISS) -> this gives you the cw
(2) get the EE nano tag from the ecm, that was sent during the brute forced cw period -> this will give you the encrypted cw
(3) you now have cw and (des-)encrypted cw, you can assume that the last byte of the des key is 00. now brute force the des key -> this is the ecm key
...so far I sent you 4 CWs of these C8...
I didn't see your help in this Tandberg thread
Hacking CA system challenge *Tandberg [ NO Keys Allowed in Chat Section/s ]*
so no more Tnadberg CWs keys from me anymore
(2) get the EE nano tag from the ecm, that was sent during the brute forced cw period -> this will give you the encrypted cw
(3) you now have cw and (des-)encrypted cw, you can assume that the last byte of the des key is 00. now brute force the des key -> this is the ecm key
anyone could explain this in details, I will be appreciate it
now you have encrypted cw and plain cw, so you can bruteforce
This is made simpler as we know the last byte of the ECM Key is 00 however it is complicated as the checksum bytes in the plain CW are manipulated from the DES decrypted CW. Fortunately, one of those CS bytes is the last one so there is only the fourth byte to allow for.
The idea is the checksum (the 4th and 8th byte of the ecm key)
Yes OSCAM Emu try reading a few pages back its all already explained ,I HAVE DREAMBOX 800PVR ITS SUpport this?
you need to totally delete your Vplug Plugins folder and replace it with @ Anubis_IR version which includes V 1.1 of Tandberg Emu Toolsometimes tanderg freezeing: not regularity by freezing time intervals between freezing
_http://prntscr.com/bolz3b
Hi Kebien
Thank you for your correction. I'm sure both of us know what we mean but make simple errors in writing it down
eg
I'm sure you meant "the 4th and 8th bytes of the CW"
00 A8 FD 18 BD 70 71 0C ED
01 80 D1 00 51 ED 92 AD 2C
00 07 66 AD 1A 97 78 AB BA
01 58 AC 1D 21 82 56 30 08
00 72 01 37 AA 88 16 7F 1D
01 B4 29 B5 92 6B CE 9D D6
00 E9 69 C1 13 A3 D8 10 8B
01 7C 44 CC 8C 1C 9F 6D 28
00 ED F6 3C 1F 03 CD 5C 2C
01 30 E4 D7 EB 5C D0 E5 11
00 58 E2 72 AC AE CB EF 68
01 86 FA 8D 0D 0A 85 37 C6
PID: 515h Crypt8:7C 90 54 33 D2 AB 0D 4E [E] Count:2
PID: 521h Crypt8:B6 10 6E B4 CF 95 F8 9E [O] Count:99
PID: 521h Crypt8:05 75 45 F3 7A BD 3F F6 [E] Count:90
I guess you mean ver 1.03, but you should use the newest version 1.23.I know nothing of crypto8 but by using ver1.3 I get ONLY