Hello Everyone,
How to find K1 for Unique Pairing Mode to put in on OScam ?
How to find K1 for Unique Pairing Mode to put in on OScam ?
Code:
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] Answer from cardreader:
2020/05/16 02:51:18 25E5EE4D r (reader) 84 3B 4E 9F 8E 0A C0 D0 F4 A4 2E 0B 0B C0 35 72
2020/05/16 02:51:18 25E5EE4D r (reader) 73 B2 EE E7 37 EF AC 68 91 BE BC 0E D8 24 B6 CF
2020/05/16 02:51:18 25E5EE4D r (reader) 20 24 71 00 5A AD 58 61 E8 49 13 59 15 69 FF 04
2020/05/16 02:51:18 25E5EE4D r (reader) BC 11 7F B7 31 05 8F DF D8 DC 49 CD AA 23 C6 9E
2020/05/16 02:51:18 25E5EE4D r (reader) AC 49 B3 2F 43 74 BF 84 CD 30 83 50 72 49 62 59
2020/05/16 02:51:18 25E5EE4D r (reader) D1 05 BE C0 CF AC 71 82 90 20
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] Decrypted payload
2020/05/16 02:51:18 25E5EE4D r (reader) DF 08 00 80 74 25 7F 28 00 00 00 0D 00 01 22 02
2020/05/16 02:51:18 25E5EE4D r (reader) 00 00 0E 02 01 00 0F 04 00 00 00 00 20 04 00 00
2020/05/16 02:51:18 25E5EE4D r (reader) 00 00 25 11 00 00 00 00 00 00 00 00 00 00 00 00
2020/05/16 02:51:18 25E5EE4D r (reader) 00 00 00 00 00 2A 04 00 0D 00 00 55 01 83 56 08
2020/05/16 02:51:18 25E5EE4D r (reader) 00 00 00 00 00 00 00 00
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] crypted CW is: 0000000000000000DF08008074257F28
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] use k1(DES) for CW decryption in unique pairing mode
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] decrypted CW is: 0000000000000000F855F434C8983EB2
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] cardreader_do_ecm: after csystem->do_ecm rc=1
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] cardreader_do_ecm: ret rc=1
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc=1 (ERROR=0)
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] ecm hash: 80733512545DC9558419492F178C91D2 real time: 153 ms
2020/05/16 02:51:18 447BBE2B c (ecm) anonymous (09B4&/17B6/17BA/17B6/I:80733512545DC9558419492F178C91D2#CW=0000000000000000F855F441C8983E9E): found (158 ms) by Card - HBx
2020/05/16 02:51:18 447BBE2B c (ecm) cw:
2020/05/16 02:51:18 447BBE2B c (ecm) 00 00 00 00 00 00 00 00 F8 55 F4 41 C8 98 3E 9E
2020/05/16 02:51:18 25E5EE4D r (reader) Card [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
Last edited: