How found ECM key Tandberg?

FaDeL®

Staff member
Super Moderator
Messages
7,402
poc 1.6
TS mode
[Emu] info: FFDecsa parallel mode = 32
[Emu] stream found pmt pid: 20
[Emu] stream found pcr_pid: B91
[Emu] stream found ecm_pid: AC9
[Emu] stream found video pid: B91
[Emu] stream found audio pid: BF5
[Emu] stream found emm_pid: 1F4
[Emu] active entitlement: CA
[Emu] got EMM nano tag E0 (EMM_TAG_RECEIVER_ALLOCATION_DESCRIPTOR) for the first time
[Emu] got EMM nano tag E4 (EMM_TAG_SECURITY_TABLE_DESCRIPTOR) for the first time
[Emu] Keys found in EMM: new nano E4 ram keys 30 to 3F
[Emu] Keys found in EMM: new nano E4 ram keys 0 to F
[Emu] Keys found in EMM: new nano E4 ram keys 10 to 1F
[Emu] Keys found in EMM: new nano E4 ram keys 20 to 2F
[Emu] Keys found in EMM: new nano E4 ram keys 30 to 3F
poc 1.6
poc 1.6
TS mode
[Emu] info: FFDecsa parallel mode = 32
[Emu] stream found pmt pid: 73
[Emu] stream found pcr_pid: 9C5
[Emu] stream found ecm_pid: 9F5
[Emu] stream found video pid: 9C5
[Emu] stream found audio pid: 9C6
[Emu] stream found audio pid: 9C7
Why not found ECM????
I rec Using receiver .
 

abed1988

VIP
Messages
5,431
because your file ts recorded is not good

poc 1.6
TS mode
[Emu] info: FFDecsa parallel mode = 32
[Emu] stream found pmt pid: 20
[Emu] stream found pcr_pid: B91
[Emu] stream found ecm_pid: AC9
[Emu] stream found video pid: B91
[Emu] stream found audio pid: BF5
[Emu] stream found emm_pid: 1F4
[Emu] active entitlement: CA
[Emu] got EMM nano tag E0 (EMM_TAG_RECEIVER_ALLOCATION_DESCRIPTOR) for the first time
[Emu] got EMM nano tag E4 (EMM_TAG_SECURITY_TABLE_DESCRIPTOR) for the first time
[Emu] Keys found in EMM: new nano E4 ram keys 30 to 3F
[Emu] Keys found in EMM: new nano E4 ram keys 0 to F
[Emu] Keys found in EMM: new nano E4 ram keys 10 to 1F
[Emu] Keys found in EMM: new nano E4 ram keys 20 to 2F
[Emu] Keys found in EMM: new nano E4 ram keys 30 to 3F
poc 1.6
poc 1.6
TS mode
[Emu] info: FFDecsa parallel mode = 32
[Emu] stream found pmt pid: 73
[Emu] stream found pcr_pid: 9C5
[Emu] stream found ecm_pid: 9F5
[Emu] stream found video pid: 9C5
[Emu] stream found audio pid: 9C6
[Emu] stream found audio pid: 9C7
Why not found ECM????
I rec Using receiver .

because your file ts recorded is not good

try again record file and try with streamrecorderx.mod dvbdream
 

jan55

Member
Messages
4,269
Meaning always:
If I have two or tree numbers, always add front of "0" ?
Cheers! m8
Format keys of Tandberg enc. in SoftCam.Key (or v_keys.db) for DVB application:
Code:
T 01 01 5xxB0xxA13xxE500 ; 
T 03E8 01 8xxD7xxFB7xx3C00 ; 
T 1600 01 3xx824xx8CExx2000 ;
 

kebien

Registered
Messages
1,329
So who's got ECM key 6? It's need to decrypt T2MI RCN mux at 40W.

How do you get the T2MI with (card)?
and why do you need it when you have RCN using dvbs2 in same sat?
You mean RTVC? has no RCN going by lyngsat.
 

drhans

Registered
Messages
116
How do you get the T2MI with (card)?
and why do you need it when you have RCN using dvbs2 in same sat?
You mean RTVC? has no RCN going by lyngsat.

Rule number 1 - never trust Lyngsat, that website is outdated as hell. I'm not just mumbling crazy stuff here. See the attached picture.



It's not clear whether the content is the same as 4028R. Probably not, the bitrate is higher. And there's no way to tell without key 6.

I don't really NEED it, just wanted to try.

AFAIK anything will tune in T2MI. It's "just" a question of extracting the TS from the data PID. Nothing special about the carrier.
 

vtcc

Registered
Messages
102
@Colibri.DVB and Anubis_Ir
poc 1.6
TS mode
[Emu] info: FFDecsa parallel mode = 32
[Emu] stream found pmt pid: 103
[Emu] stream found pcr_pid: 191
[Emu] stream found ecm_pid: 7D1
[Emu] stream found video pid: 191
[Emu] stream found audio pid: 1007
[Emu] stream found audio pid: 1069
[Emu] stream found emm_pid: 7D0
[Emu] active entitlement: 691
[Emu] got EMM nano tag E0 (EMM_TAG_RECEIVER_ALLOCATION_DESCRIPTOR) for the first time
[Emu] got EMM nano tag E4 (EMM_TAG_SECURITY_TABLE_DESCRIPTOR) for the first time
[Emu] Keys found in EMM: new nano E4 ram keys 0 to F
[Emu] Keys found in EMM: new nano E4 ram keys 10 to 1F
[Emu] Keys found in EMM: new nano E4 ram keys 20 to 2F
[Emu] Keys found in EMM: new nano E4 ram keys 30 to 3F
[Emu] Keys found in EMM: new nano E4 ram keys 0 to F
[Emu] Keys found in EMM: new nano E4 ram keys 10 to 1F
[Emu] Keys found in EMM: new nano E4 ram keys 20 to 2F
[Emu] Keys found in EMM: new nano E4 ram keys 30 to 3F
[Emu] Keys found in EMM: new nano E4 ram keys 0 to F
[Emu] Keys found in EMM: new nano E4 ram keys 10 to 1F
[Emu] Keys found in EMM: new nano E4 ram keys 20 to 2F
[Emu] Keys found in EMM: new nano E4 ram keys 30 to 3F
[Emu] Keys found in EMM: new nano E4 ram keys 0 to F
[Emu] Keys found in EMM: new nano E4 ram keys 10 to 1F
[Emu] Keys found in EMM: new nano E4 ram keys 20 to 2F
[Emu] Keys found in EMM: new nano E4 ram keys 30 to 3F
[Emu] Keys found in EMM: new nano E4 ram keys 0 to F
[Emu] Keys found in EMM: new nano E4 ram keys 10 to 1F
[Emu] Keys found in EMM: new nano E4 ram keys 20 to 2F
[Emu] Keys found in EMM: new nano E4 ram keys 30 to 3F
[Emu] Keys found in EMM: new nano E4 ram keys 0 to F
[Emu] Keys found in EMM: new nano E4 ram keys 10 to 1F
[Emu] Keys found in EMM: new nano E4 ram keys 20 to 2F


IMG Asia feed
TS link:https://mega.nz/#!kop0jThK!tiwhHEOr8NZAHe639KaUepSiVoZEFq7i0KM8igWf6XM
I can not find ECM key.Someone can help ?
 

ViaHussun

Donating Member
Messages
4,098
you are right xosef1234, my mistake I just followed the starting of the DES encrypted cw that was posted by dmr0x, I guess he missed it too.

it's yes and should be like this according to the file uploaded by dmr0x


so the decrypted cw from this C8
Code:
[B]PID: 19Ah  B8h-Crypt8:61 8D 32 2E 56 8F B3 4B  [[B][COLOR="Red"]O[/COLOR][/B]] Count:211[/B]
which was found from the ts file {odd pid } uploaded by dmr0x is attached :thum:

now we have the encrypted ECM key ==> { DES encrypted key } and we have the decrypted cw what should we do next ?

How to BF and find the working ECM key when we have both encrypted ECM key and decrypted cw ?


With this value => DB XX XX XX XX XX XX 20 and this value => DA XX XX XX XX XX XX 70 We introduce and search the necessary broadcast record via FPGA.Is detection correct?


1.value

Code:
47 47 DA 1E 00 80 70 18 EE 16 00 00 0A 26 [B]DB FE 27 33 72 CE 77 20[/B] E9 2C 95 14 7F 23 17 72 A5 63
47 47 DA 11 00 81 70 18 EE 16 00 00 0A 26 [B]DB FE 27 33 72 CE 77 20[/B] D4 18 35 35 1D D3 10 2C 4D 12

2.value

decrypted CW: DA D0 56 00 33 FE 3F 70
 
Last edited:

ViaHussun

Donating Member
Messages
4,098
@ViaHussun I seen your PMs, do not need to send multiple. At most that only make me feel that I been harass. 1 Pm is enough. I will answer when I have time.

Now if the question behind all this is to provoke me to release any executable. It will not happen any time soon.

I would not go into details as then I will received a complain or bann for doing "Flaming or any other inappropriate behavior towards other members is not allowed.".

=========================================================
Introduction.

barney2222's video link is perfect for the type of situation when poc.exe find the key. Nice.

Now lets assume that you do really are interest in knowing what is been done, "How found ECM key?" when poc.exe do not help.

Well only way I know is Brute Force the solution.

Now you want to read:
What is a Brute-force attack:
https://en.wikipedia.org/wiki/Brute-force_attack

The Protocol Use
https://en.wikipedia.org/wiki/Data_Encryption_Standard

The only porpoise of the previous links is to show that understanding what has to be done, requires knowledge witch requires many hours of self learning witch then will allow you to understand a multitude of complex operations.

=============================================================
But you will say in Powervu I has this tool.

You feed a -Log of EMMs- > PVHE > and it output the -Master Key-

Yes Colibri powervu analysis was amazing. Thanks. And latter the implementation of PVHE by anubis_ir was even beautiful.

As a result, most of you has collected the wrong or false Idea that you can do Bruteforce for anything in that simple way. So many of you think where is that tool, so I can do the same in tandberg.

I am sorry to tell you that:

a) Finding the crypt DES Block in Tandberg stream that you can then Find the Clear DES Block is 1 big problem.
b) Now Brute-force a DES Block by itself is another complicated thing.


So in powervu you just ask vplug to record a 20-40meg log of emm. Simple. Finding the DES Clear/Crypt Pair is not that easy. You need to use multiple of other tools to get to the different parts that you need. Just to be able to identify that crypt/clear pair, If you make a simple mistake in the identification, then your many hours to Bruteforce will produce 0 results or Incorrect.

=====================================================
Suggestion.
Before you continue to indirectly ask for a tool. First prove yourself useful by recording a TS file and finding a Valid Clear / Crypt Des Block of information that you then can try to bruteforce.

If you get to that point, then you may be requiring a tool to do Des Brute Force.

heres a segment from an already know TD enc channel

ive cut it exactly on the key roll
https://mega.nz/#!Xdk1XCaB!dJa6tFPaNLrY27fIC6IMTKY4MxPptUw_rIsJyTyAG-g

decrypted CW is : Dx xx xx xx xx xx x0

cant post keys here but if you want to find it the c8 is in the ts

now to find its(des-)encrypted cw after some sleep, hopefully


Code:
# this is an ModySat cw log file 
#
# type:
# MODYSAT -f ModySat.cwl -i ModySat_crypted.ts -o ModySat_clean.ts
#
0 DA D0 56 00 33 FE 3F 70
1 DA D0 56 00 33 FE 3F 70


@ dale para bajo; What will I doing after that ?
@ dale_para_bajo; I am constantly attacking you like brute force :D
do not angry me,I want to learn the right knowledge. :)
 

dale_para_bajo

Registered
Messages
646
Listen I have not review what you did. I am not downloading that. But as yo show picture you now know what many here knew for years. That is how CSA works. You have a couple of CW and used it to decrypt Vidoe and Audio. This is one of the Shells sorrounding the TS encryption. The sat cas system is like a onion it has many layers.

Now the previous part where you played with ECM. is the part where a you get the CW's. All that seems easy to you.

Now the part that ALL had told you is that you need a lot of reading and learning to even try to figure out how to take the ECM Payload and using the CW as a Plain Text then do the Brute Force Attack. This is U S National Security Agency work. They where the one that build this in 1rst place. But it was intended to be use in 30-40 years ago.
 
Top