2020/08/28 10:35:16 11111111 r (reader) dolce [videoguard2] Decrypted payload
2020/08/28 10:35:16 11111111 r (reader) EE EE EE EE EE EE EE EE 00 00 00 01 00 01 22 02
2020/08/28 10:35:16 11111111 r (reader) 00 00 0E 02 01 00 0F 04 00 00 00 00 20 04 00 00
2020/08/28 10:35:16 11111111 r (reader) 00 00 25 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
2020/08/28 10:35:16 11111111 r (reader) 00 00 00 00 00 55 01 83 56 08 00 00 00 00 00 00
2020/08 / 28 10:35:16 11111111 r (reader) 00 00
2020/08/28 10:35:16 11111111 r (reader) dolce [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83 2020/08
/ 28 10:35:16 11111111 r (reader) dolce [videoguard2] crypted CW is: EEEEEEEEEEEEEEEE 0000000000000000
2020/08/28 10:35:16 11111111 r (reader) dolce [videoguard2] k1 for unique pairing mode is not set
2020/08/28 10:35:16 11111111 r (reader) dolce [videoguard2] cardreader_do_ecm: after csystem-> do_ecm rc = 0
2020/08/28 10:35:16 11111111 r (reader) dolce [videoguard2] cardreader_do_ecm: ret rc = 0
2020/08/28 10:35:16 11111111 r (reader) dolce [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc = 0 (ERROR = 0)
2020/08/28 10:35:16 11111111 r (reader) dolce [videoguard2] Error processing ecm for caid 092F, provid 000000, srvid 011D, servicename: 092F @ 000000: 011D unknown
2020/08/28 10:35:16 11111111 r (reader) dolce [videoguard2] ecm hash: FE26BDB640F3E4C566C5A54973C2346A real time: 125 ms
2020/08/28 10:35:16 22222222 p (cccam) cccam: ecm-task 25
2020/08/28 10:35:16 22222222 p (cccam) cccam (r) server: sending ecm for sid 011D (131) to card 00002054, hop 1, ecmtask 25
2020/08/28 10:35:16 22222222 p (cccam) cccam (r) server: no ecm pending!
2020/08/28 10:35:16 22222222 p (cccam) cccam (r) server: parse_msg = 1
2020/08/28 10:35:16 22222222 p (cccam) cccam (r) server: cws: 25 DDDDDDDDDDDDDDDDDDDDDD 0000000000000000
2020/08/28 10:35:16 22222222 p (cccam) cccam (r) server: no ecm pending!
2020/08/28 10:35:16 123098B1 c (ecm) dvbapi (P: 092F: 000000: 011D: 04A1: 011D: #ECM_L: 83 # CW = DDDDDDDDDDDDDDDDDDDDDDD 0000000000000000 HOP: 01): found (278 ms): found (278 ms) / 2/2/2)
2020/08/28 10:35:07 11111111 r (reader) dolce [videoguard2] cardreader_do_checkhealth: reader-> card_status = 2, ret = 1
2020/08/28 10:35:15 11111111 r (-) - Skipped 8 duplicated log lines -
2020/08/28 10:35:15 11111111 r (reader) dolce [videoguard2] write to cardreader
2020/08/28 10:35:15 11111111 r (reader) pp pp 00 00 02
2020/08/28 10:35:15 11111111 r (reader) dolce [videoguard2] Answer from cardreader:
2020/08/28 10:35:15 11111111 r (reader) 00 00 00 00 90 20
2020/08/28 10:35:16 11111111 r (reader) dolce [videoguard2] carD
[/ SPOILER]
[QUOTE = "JaggerDreamboxUser, post: 3814274, member: 364172"]
092F is at any case DES i think!
I have a workmate, he have the same card. I have high power hashcat at home, and i help some friends from this board to calculate the K1.
[/ QUOTE] [/ SPOILER] [/ SPOILER]
dizcza / docker-hashcat
and the commnad is:
hashcat -m 14000 EEEEEEEEEEEEEEEE : DDDDDDDDDDDDDDDDDDDD -o cracked.txt -a 3 -1 /usr/share/hashcat/charsets/DES_full.charset --hex-charset? 1? 1? 1? 1? 1? 1? 1? 1 -w 4 --force [/ SPOILER]