r (reader) AirTel_Hd [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] crypted CW is: 0000000000000000DCE2D5C22654BB6D
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] use k1(DES) for CW decryption in unique pairing mode
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] decrypted CW is: 0000000000000000776A1357CEC9BAC1
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] cardreader_do_ecm: after csystem->do_ecm rc=1
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] cardreader_do_ecm: ret rc=1
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc=1 (ERROR=0)
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] ecm hash: 5F4D9E0F098DE60B7F9DDE9A931D3BE8 real time: 114 ms
2020/05/03 19:20:10 1A1602EC c (ecm) abc (09AA@000000/0066/044E/63:5F4D9E0F098DE60B7F9DDE9A931D3BE8:0F06000000000000:): found (165 ms) by AirTel_Hd - Zee TV @ Rs 19
2020/05/03 19:20:10 1A1602EC c (ecm) cw:
2020/05/03 19:20:10 1A1602EC c (ecm) 00 00 00 00 00 00 00 00 77 6A 13 57 CE C9 BA C1
Need Help NDS Videoguard Cards OSCam k1 unique pairing key
-
- Videoguard2 Cards OSCam
- sahilhussain33
- Thread is marked as Resolved.
-
-
master G
Added the Label NDS Videoguard Cards OSCam -
sahilhussain33
Changed the title of the thread from “need help airtel hd 108 k1 unique pering key” to “NDS Videoguard Cards OSCam k1 unique pairing key”. -
ok
-
sahilhussain33
Changed the title of the thread from “NDS Videoguard Cards OSCam k1 unique pairing key” to “Need Help NDS Videoguard Cards OSCam k1 unique pairing key”. -
i think you are using fake k1
-
r (reader) AirTel_Hd [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] crypted CW is: 0000000000000000DCE2D5C22654BB6D
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] use k1(DES) for CW decryption in unique pairing mode
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] decrypted CW is: 0000000000000000776A1357CEC9BAC1
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] cardreader_do_ecm: after csystem->do_ecm rc=1
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] cardreader_do_ecm: ret rc=1
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc=1 (ERROR=0)
2020/05/03 19:20:10 385ECE13 r (reader) AirTel_Hd [videoguard2] ecm hash: 5F4D9E0F098DE60B7F9DDE9A931D3BE8 real time: 114 ms
2020/05/03 19:20:10 1A1602EC c (ecm) abc (09AA@000000/0066/044E/63:5F4D9E0F098DE60B7F9DDE9A931D3BE8:0F06000000000000:): found (165 ms) by AirTel_Hd - Zee TV @ Rs 19
2020/05/03 19:20:10 1A1602EC c (ecm) cw:
2020/05/03 19:20:10 1A1602EC c (ecm) 00 00 00 00 00 00 00 00 77 6A 13 57 CE C9 BA C1how to find ecw dcw from this logs?
-
ecw = (en)crypted CW
dcw = decrypted CWyou only need the last 8 bytes (16 characters)
-
ecw from your card
dcw is 77....
for actuale flash 5f............
OSCam Support Forum
Participate now!
Don’t have an account yet? Register yourself now and be a part of our community!