how to find a biss key for feeds?

There are 50 replies in this Thread which was already clicked 7,189 times. The last Post () by rush1.

  • Go to Best Answer
  • The CWFinder only works when the Key is listed in CWBrute List.

    Normally you use the .ts file, then get the C8 Key (see here) then use the CSA Rainbow tables (from here) and then you get the BISS key.

    But.... the rainbow tables are quite huge (around 200GB) and you need a fast graphics card to bruteforce the key. It can take up to 5 minutes on a SSD with NVidia with CUDA.

    Another way is to buy a cheap Chinese receiver with autobiss function. Here the receiver sends a part of the .ts stream to a server, then the server does the job and you get the key back. You can export it from the local softcam file on the receiver and then post it here or export it to any other softcam :)

  • master G

    Added the Label Biss Feed Key Support
    • Official Post
    Code
    half the links don't work on http://colibri.bplaced.net/csa_rainbow_table.htm

    i have most, if not all that data on HDD, what we need is a suitable place to share it, a file host that is free and can handle 1.2TB of data

  • Code
    half the links don't work on http://colibri.bplaced.net/csa_rainbow_table.htm

    i have most, if not all that data on HDD, what we need is a suitable place to share it, a file host that is free and can handle 1.2TB of data

    there was one member of th sat universe who shared a link and I uploaded some tables there


    here for you _https://csar.birds.web.id

  • Another way is to buy a cheap Chinese receiver with autobiss function. Here the receiver sends a part of the .ts stream to a server, then the server does the job and you get the key back. You can export it from the local softcam file on the receiver and then post it here or export it to any other softcam :)

    do i need to tune the frequency with BISS encrypted stream every time to get the key from these "chinese servers"? is it possible to just download the latest softcam.key file from this server based on other user's inputs in the past? i'm just looking to share keys within a group of friends and watch the feed myself only once in a while ...

    • Official Post

    Another way is to buy a cheap Chinese receiver with autobiss function. Here the receiver sends a part of the .ts stream to a server, then the server does the job and you get the key back. You can export it from the local softcam file on the receiver and then post it here or export it to any other softcam :)

    do i need to tune the frequency with BISS encrypted stream every time to get the key from these "chinese servers"? is it possible to just download the latest softcam.key file from this server based on other user's inputs in the past? i'm just looking to share keys within a group of friends and watch the feed myself only once in a while ...

    You speak of different things.


    Feed keys last hours at the most, so you need reception, IE a satellite dish with reception and a key for the feed assuming it is encrypted

    "feeds" are from one broadcaster to another provider, it is not meant for the average end user.

    So say a football match in Spain required for rebroadcasting on local TV in China,

    the game will be broadcast on a common satellite that can received in China from the Spanish uplink.

    Then rebroadcast on there own local satellite system

    Common Satellites for feeds are 7 and 10 east. (and many others)

    See here for feed keys:

    Biss Feed Keys


    Regular softcam keys can be download in its own section

  • thanks for the detailed response jenseneverest . even though the feeds are active only for a few hours, i would expect these "Chinese servers" to be smart. They would not be computing the key every time someone switches the receiver to a BISS encrypted channel. once someone's receiver has uploaded the necessary parts of .ts stream, the server would compute and store only the 8 byte key values. consequently when another person's receiver asks for the same key, the server would just provide the key instead of asking to upload .ts chunk all over again.


    my question is : if a feed's .ts chunk is already uploaded by some receiver to the server in the past, the server would already have the key for that particular feed (possibly uniquely identified by geolocation of the satellite, frequency, SR, SID etc.). would i be able to get these readily available keys without actually tuning my receiver to that particular satellite/frequency/SR/SID etc.?


    perhaps zapf2000 would want to chip in too ?


    cheers

  • They do exactly what you are saying…but they are computing the request using an hash calculated in a way which is not known so you cannot just contact the server and get the key

  • Yes, rush1 is right. Every request is hash based, so it's not possible to get the key directly (perhaps through an API, but it's unknown). I'll sniff communication with wireshark when I have time to.

    A possibility would be to setup an own server, that does the job. Currently this is all done manually (pipe .ts to C8 calculator, export C8 to Rainbow Table Tool, export the key to Softcam.Key, restart Oscam). As I already built up a CUDA Server on my Linux Maschine, the key finding was boostet a lot. I get most keys in a few seconds.

    If we had a Enigma plugin for extracting C8 out of .ts and send it to my server, read the key back and update Softcam.key, it could all be done automatically as the BISS autokey function does. We could define the protocols and security ourselfes.

    Someone likes Python programming? ;)

  • i was looking for server software to calculate cw from crypto8 that can run on linux but I would not find it, python is not a big deal but starting from scrath maybe be a problem. In addition we definitely need a linux vm with nvidia GPU. Ideally the workflow should be

    1) ask the server for all known keys for the feed.. "0070:11017:V:7199"

    2) test all keys

    3) if not working, wait for C8, extract it and send to the server

    4) polling server while it calculates the CW

    5) receive the CW

  • although my understanding of biss implementation and hacks is rather limited, a couple of things to note

    ask the server for all known keys for the feed.. "0070:11017:V:7199"

    blind scans on different receivers almost always throw up frequency and SR values a bit off from the "real" ones. for instance, the unique hash mentioned above could actually be of the feed on frequency 11015 Mhz with SR 7200. these variations need to be taken into account when the receiver askes server for a key


    i think a cleaner implementation would be as suggested by zapf2000 . extract crypt8's using enigma2 plugin and then send it to the server. how compute intensive is getting c8 from raw .ts ? can an average e2 box do it without much fuss?

  • i think a cleaner implementation would be as suggested by zapf2000 . extract crypt8's using enigma2 plugin and then send it to the server. how compute intensive is getting c8 from raw .ts ? can an average e2 box do it without much fuss?

    this is an approach...i guess if the SR is 7199 or 7200 or 7202 wil be considered the same. Regarding the ability to get c8 from raw ts not sure how to do that in python too, need to study the cpp code to understand

  • although my understanding of biss implementation and hacks is rather limited, a couple of things to note

    ask the server for all known keys for the feed.. "0070:11017:V:7199"

    blind scans on different receivers almost always throw up frequency and SR values a bit off from the "real" ones. for instance, the unique hash mentioned above could actually be of the feed on frequency 11015 Mhz with SR 7200. these variations need to be taken into account when the receiver askes server for a key


    i think a cleaner implementation would be as suggested by zapf2000 . extract crypt8's using enigma2 plugin and then send it to the server. how compute intensive is getting c8 from raw .ts ? can an average e2 box do it without much fuss?

    It takes nearly no CPU power to get C8 out of TS, because the TS package is only parsed and cut to get the 8 Bytes out of the 184 Bytes payload in TS.

    I found an old code snippet written in perl, which does the job.

  • By the way, the BISS Autokey function of some receivers base on the FreeDVB BISS API. When you have an API key, you can easily obtain the CW via API....

Keys for Biss Encrypted Feeds

Satellite TV biss keys for Athletics, Basketball, Biking, Boxing, Cage Fighting MMA - UFC, Cricket, Dutch TV, Equestrian, Football, Formula 1, Gymnastics, Handball, Ice Hockey, Martial Arts, Motorsport, NFL Football, Ping Pong, Rowing, Rugby, Sailing, Skateboarding, Soccer, Tennis, TV shows, Winter Sport, Wrestling, Test & Unknown feeds.

Participate now!

Don’t have an account yet? Register yourself now and be a part of our community!