I cannot help with that. You need to brute force it yourself.
Needed oscam config for NDS videoguard Sky card 83 East - few channels are working even without boxid
-
- General OSCam
- subasathees
- Thread is marked as Resolved.
There are 65 replies in this Thread which was already clicked 19,603 times. The last Post () by forsatatceh.
-
-
brute force?
-
how to creck k1 key on brute force plz Gide me
-
hi bro all channel ecm working ok but no video nds videogard2 airtel hd 108e plz see log and help
reader) AirTel_Hd [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83
2020/05/16 08:13:53 1BDD816E r (reader) AirTel_Hd [videoguard2] crypted CW is: 939A425E3BE0800E0000000000000000
2020/05/16 08:13:53 1BDD816E r (reader) AirTel_Hd [videoguard2] use k1(DES) for CW decryption in unique pairing mode
2020/05/16 08:13:53 1BDD816E r (reader) AirTel_Hd [videoguard2] decrypted CW is: A823620D04379A030000000000000000
2020/05/16 08:13:53 1BDD816E r (reader) AirTel_Hd [videoguard2] cardreader_do_ecm: after csystem->do_ecm rc=1
2020/05/16 08:13:53 1BDD816E r (reader) AirTel_Hd [videoguard2] cardreader_do_ecm: ret rc=1
2020/05/16 08:13:53 1BDD816E r (reader) AirTel_Hd [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc=1 (ERROR=0)
2020/05/16 08:13:53 1BDD816E r (reader) AirTel_Hd [videoguard2] ecm hash: 092F598AA7EEC605E3615C91B3A2AA54 real time: 115 ms
2020/05/16 08:13:53 354692D5 c (ecm) anonymous (09AA@000000/0065/044D/63:092F598AA7EEC605E3615C91B3A2AA54:0F06000000000000:): found (117 ms) by AirTel_Hd - Star Plus @ Rs 19
2020/05/16 08:13:53 354692D5 c (ecm) cw:
2020/05/16 08:13:53 354692D5 c (ecm) A8 23 62 0D 04 37 9A 03 00 00 00 00 00 00 00 00
2020/05/16 08:13:54 1BDD816E r (reader) AirTel_Hd [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2020/05/16 08:13:55 652396B3 h (-) -- Skipped 1 duplicated log lines --
2020/05/16 08:13:55 652396B3 h (webif) all debug_level=6send log file
-
ok
plz see attachment
-
plz see attachment
need config chk your pm box
-
I tried with even r11578 but the errors are same.
2020/05/04 17:51:43 39870519 c (ecm) dvbapiau (0944@000000/0193/0643/A3:6BC1BEDAF3FB6E100BCDDC2578A41C11:0F06001000000000): not found (117 ms) by lower_card2020/05/04 17:51:43 39870519 c (ecm) cw:2020/05/04 17:51:43 39870519 c (ecm) 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2020/05/04 17:51:44 39870519 c (dvbapi) New events occurred on 1 of 2 handlers after 504 ms inactivity2020/05/04 17:51:44 39870519 c (dvbapi) Now handling fd 11 that reported event 32
i tried but not work in Arm devices
-
how to find DCW ECW
2020/06/11 00:54:22 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2020/06/11 00:54:26 1616A69C c (-) -- Skipped 3 duplicated log lines --
2020/06/11 00:54:26 1616A69C c (ecm) get cw for ecm:
2020/06/11 00:54:26 1616A69C c (ecm) 81 70 60 00 00 01 0E C5 0A 9B 07 03 70 AA 55 91
2020/06/11 00:54:26 1616A69C c (ecm) 20 01 00 00 A4 4D 7E 0A CD 8C B1 CD B6 F0 77 E2
2020/06/11 00:54:26 1616A69C c (ecm) 00 00 90 3F C0 01 A6 EE 2C 88 B0 CD 58 FA E4 0C
2020/06/11 00:54:26 1616A69C c (ecm) FA 09 6F 6E 55 52 4E 27 C3 14 88 BC 56 D0 4A 48
2020/06/11 00:54:26 1616A69C c (ecm) AB 42 3F 24 D8 43 9E C7 E7 82 1B 3F 50 8F AA 2E
2020/06/11 00:54:26 1616A69C c (ecm) 97 E0 DA 55 52 3D E6 E9 7E 3D 0A B0 E0 77 52 73
2020/06/11 00:54:26 1616A69C c (ecm) 36 7F C3
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_ecm: cardreader_do_checkhealth returned rc=1
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] write to cardreader
2020/06/11 00:54:26 3BBCD5F4 r (reader) D1 40 00 80 4E 00 7E 0A CD 8C B1 CD B6 F0 77 E2
2020/06/11 00:54:26 3BBCD5F4 r (reader) 00 00 90 3F C0 01 A6 EE 2C 88 B0 CD 58 FA E4 0C
2020/06/11 00:54:26 3BBCD5F4 r (reader) FA 09 6F 6E 55 52 4E 27 C3 14 88 BC 56 D0 4A 48
2020/06/11 00:54:26 3BBCD5F4 r (reader) AB 42 3F 24 D8 43 9E C7 E7 82 1B 3F 50 8F AA 2E
2020/06/11 00:54:26 3BBCD5F4 r (reader) 97 E0 DA 55 52 3D E6 E9 7E 3D 0A B0 E0 77 52 73
2020/06/11 00:54:26 3BBCD5F4 r (reader) 36 7F C3
2020/06/11 00:54:26 00000000 >> OSCam << cardserver log switched, version 1.20_svn, build r11578-798 (mipsel-tuxbox-linux-gnu)
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] Answer from cardreader:
2020/06/11 00:54:26 3BBCD5F4 r (reader) 90 20
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] write to cardreader
2020/06/11 00:54:26 3BBCD5F4 r (reader) D3 54 00 00 58
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] Answer from cardreader:
2020/06/11 00:54:26 3BBCD5F4 r (reader) FC 63 C4 D9 92 AB 89 7C 9F 67 D7 F1 C7 AA 9C 03
2020/06/11 00:54:26 3BBCD5F4 r (reader) D2 D6 82 B4 46 17 25 05 48 1F 67 37 03 E1 4C 0E
2020/06/11 00:54:26 3BBCD5F4 r (reader) F5 E2 34 84 77 67 F7 D8 9F 80 94 49 C0 DF 2A 74
2020/06/11 00:54:26 3BBCD5F4 r (reader) FB A0 AB 37 97 4D E8 FC FA FF 8D E4 54 9B 18 FA
2020/06/11 00:54:26 3BBCD5F4 r (reader) 06 7D 58 75 33 AA 03 F9 A4 CD E8 39 BC A8 D9 2A
2020/06/11 00:54:26 3BBCD5F4 r (reader) 0D 1C 1A CB C5 9C 7B 58 90 20
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] Decrypted payload
2020/06/11 00:54:26 3BBCD5F4 r (reader) C9 18 EE 43 94 1C DB 03 00 00 01 90 01 01 22 02
2020/06/11 00:54:26 3BBCD5F4 r (reader) 00 00 0E 02 01 00 0F 04 00 00 00 00 20 04 00 00
2020/06/11 00:54:26 3BBCD5F4 r (reader) 00 00 25 11 00 00 00 00 00 00 00 00 00 00 00 00
2020/06/11 00:54:26 3BBCD5F4 r (reader) 00 00 00 00 00 2A 04 01 90 00 00 55 01 83 56 08
2020/06/11 00:54:26 3BBCD5F4 r (reader) 00 00 00 00 00 00 00 00
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] crypted CW is: 0000000000000000C918EE43941CDB03
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] use k1(DES) for CW decryption in unique pairing mode
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] decrypted CW is: 0000000000000000A8277D26CDF577EC
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_ecm: after csystem->do_ecm rc=1
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_ecm: ret rc=1
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc=1 (ERROR=0)
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] ecm hash: 7AC7801A1636AEF6D626823B576E5ADC real time: 133 ms
2020/06/11 00:54:26 1616A69C c (ecm) dvbapiau (09AA@000000/0370/2B77/63:7AC7801A1636AEF6D626823B576E5ADC:0F06000000000000:): found (147 ms) by TATA (L/1/2/2) - Zee TV HD @ Rs 19
2020/06/11 00:54:26 1616A69C c (ecm) cw:
2020/06/11 00:54:26 1616A69C c (ecm) 00 00 00 00 00 00 00 00 A8 27 7D 4C CD F5 77 39
2020/06/11 00:54:26 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2020/06/11 00:54:33 3BBCD5F4 r (-) -- Skipped 7 duplicated log lines --
2020/06/11 00:54:33 3BBCD5F4 r (reader) TATA [videoguard2] write to cardreader
2020/06/11 00:54:33 3BBCD5F4 r (reader) D1 5C 00 00 04
2020/06/11 00:54:33 3BBCD5F4 r (reader) TATA [videoguard2] Answer from cardreader:
2020/06/11 00:54:34 3BBCD5F4 r (reader) 00 00 00 00 90 20
2020/06/11 00:54:34 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2020/06/11 00:54:36 1616A69C c (-) -- Skipped 1 duplicated log lines --
2020/06/11 00:54:36 1616A69C c (ecm) get cw for ecm:
2020/06/11 00:54:36 1616A69C c (ecm) 80 70 60 00 00 01 0E C5 0A 9B 0C 03 70 AA 55 91
2020/06/11 00:54:36 1616A69C c (ecm) 20 01 00 00 A9 4D 7E 0A 7B 6D 3B D7 64 B3 3F 46
2020/06/11 00:54:36 1616A69C c (ecm) 00 00 90 3F C0 01 A4 FE 7C D9 2B C8 06 90 D3 53
2020/06/11 00:54:36 1616A69C c (ecm) 86 5E 81 41 D5 45 70 2E 93 59 AC B9 5A 95 DD 87
2020/06/11 00:54:36 1616A69C c (ecm) 1F 7A C1 06 2E DB 47 76 3C 3F D7 86 37 E8 02 C4
2020/06/11 00:54:36 1616A69C c (ecm) 6C 71 89 F6 4A 20 DD 78 D3 41 31 44 08 AD 03 53
2020/06/11 00:54:36 1616A69C c (ecm) 8B 1B DB
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_ecm: cardreader_do_checkhealth returned rc=1
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] write to cardreader
2020/06/11 00:54:36 3BBCD5F4 r (reader) D1 40 00 80 4E 00 7E 0A 7B 6D 3B D7 64 B3 3F 46
2020/06/11 00:54:36 3BBCD5F4 r (reader) 00 00 90 3F C0 01 A4 FE 7C D9 2B C8 06 90 D3 53
2020/06/11 00:54:36 3BBCD5F4 r (reader) 86 5E 81 41 D5 45 70 2E 93 59 AC B9 5A 95 DD 87
2020/06/11 00:54:36 3BBCD5F4 r (reader) 1F 7A C1 06 2E DB 47 76 3C 3F D7 86 37 E8 02 C4
2020/06/11 00:54:36 3BBCD5F4 r (reader) 6C 71 89 F6 4A 20 DD 78 D3 41 31 44 08 AD 03 53
2020/06/11 00:54:36 3BBCD5F4 r (reader) 8B 1B DB
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] Answer from cardreader:
2020/06/11 00:54:36 3BBCD5F4 r (reader) 90 20
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] write to cardreader
2020/06/11 00:54:36 3BBCD5F4 r (reader) D3 54 00 00 58
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] Answer from cardreader:
2020/06/11 00:54:36 3BBCD5F4 r (reader) 59 F8 8A E3 29 96 8A 8F 5E 70 98 EC 77 CA 9A C7
2020/06/11 00:54:36 3BBCD5F4 r (reader) 12 5B 00 1C 2A B2 A2 5C BE 60 26 1B 76 B2 EE 1E
2020/06/11 00:54:36 3BBCD5F4 r (reader) 90 5E E7 40 4F 85 8A 76 96 2F AA 53 8D 75 6C C6
2020/06/11 00:54:36 3BBCD5F4 r (reader) 8A 77 6C 6F D0 3C 0C 02 82 52 5F 24 3A 51 D6 A4
2020/06/11 00:54:36 3BBCD5F4 r (reader) 8C 0B 2D 4A 96 76 E7 99 30 DF 4A 6F 87 F9 D1 E9
2020/06/11 00:54:36 3BBCD5F4 r (reader) DA 45 75 3C CC E0 FC F4 90 20
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] Decrypted payload
2020/06/11 00:54:36 3BBCD5F4 r (reader) CF 52 E9 32 4B 9E 98 87 00 00 01 90 01 01 22 02
2020/06/11 00:54:36 3BBCD5F4 r (reader) 00 00 0E 02 01 00 0F 04 00 00 00 00 20 04 00 00
2020/06/11 00:54:36 3BBCD5F4 r (reader) 00 00 25 11 00 00 00 00 00 00 00 00 00 00 00 00
2020/06/11 00:54:36 3BBCD5F4 r (reader) 00 00 00 00 00 2A 04 01 90 00 00 55 01 83 56 08
2020/06/11 00:54:36 3BBCD5F4 r (reader) 00 00 00 00 00 00 00 00
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] crypted CW is: CF52E9324B9E98870000000000000000
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] use k1(DES) for CW decryption in unique pairing mode
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] decrypted CW is: 9D9EF118623A6DC80000000000000000
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_ecm: after csystem->do_ecm rc=1
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_ecm: ret rc=1
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc=1 (ERROR=0)
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] ecm hash: 34D998170CB7E915D986EE3BC7FD2CD5 real time: 142 ms
2020/06/11 00:54:36 1616A69C c (ecm) dvbapiau (09AA@000000/0370/2B77/63:34D998170CB7E915D986EE3BC7FD2CD5:0F06000000000000:): found (155 ms) by TATA (L/1/2/2) - Zee TV HD @ Rs 19
2020/06/11 00:54:36 1616A69C c (ecm) cw:
2020/06/11 00:54:36 1616A69C c (ecm) 9D 9E F1 2C 62 3A 6D 09 00 00 00 00 00 00 00 00
2020/06/11 00:54:36 3BBCD5F4 r (reader) TATA [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
-
Any one can help me to get k1 and payload for 1709 ?
-
use heshcat than find k1...
-
0F 04 00 10 00 00
"classD3 ins54: no cw --> Card needs pairing/extra data"
The "not working" channels are paired. You need the correct K1 and INS7E payload to clear them. This is nigh on impossible unless you can get the card into the "paired" mode and get a matching dCW/ eCW couple. I suspect getting a dCW will be the hardest to achieve.
The "working" channels are not paired.
0F 04 00 00 00 00
thank you
-
How do you find INS7e from the official T*t* Sly STB?
-
Any hashcat expert here? how to decode if i have ecw and dcw ?
-
Any hashcat expert here? how to decode if i have ecw and dcw ?
use cmd
-
Any hashcat expert here? how to decode if i have ecw and dcw ?
use cmd
kindly explain in IB about cmd commands
-
Please can somebody point out how to get the Box id from the official STB?
-
Tata sky nds HD need get cwpk first
-
Please can somebody point out how to get the Box id from the official STB?
XOr calculator
-
Please can somebody point out how to get the Box id from the official STB?
oxr calculator
you mean XOR or box ???
if you have this app. upload it here plz
-
OSCam Support Forum
Configs, discussion, downloads and guides for OSCam Softcam.
Participate now!
Don’t have an account yet? Register yourself now and be a part of our community!