Posts by polo1996

    I use debian6 with oscam/cccam with smargo no problem i have same card 093e
    my config maby not perfect but it works




    [global]
    logfile = /var/log/oscam.log
    #clienttimeout = 5000
    fallbacktimeout = 2500
    nice = -1
    preferlocalcards = 1
    saveinithistory = 1


    [anticasc]
    enabled = 1
    numusers = 1 #1 user is allowed. If oscam detects more then 1 request within 10 Seconds from same user cascading is detected.
    sampletime = 2
    samples = 10
    penalty = 0
    aclogfile = /tmp/oscam_ac.log #important, because you will be able to see, what is OScam doing.
    denysamples = 10 or 9
    fakedelay = 4000 #or 2500



    [monitor]
    hideclient_to = 15
    appendchaninfo = 0




    [webif]
    httpport = 8888
    httpuser = user
    httppwd = pass
    httprefresh = 5
    #httpallowed = 10.0.0.1 - 10.0.0.255
    httpallowed = 127.0.0.1,192.168.1.1-192.168.1.199
    httphideidleclients = 1
    httpreadonly = 0
    httpsavefullcfg = 0





    [newcamd]
    key = 0102030405060708091011121314
    port = 34000@093E:000000


    #allowed =
    keepalive = 1
    #mgclient = 1



    [cccam]
    port = 24500
    cccversion = 2.1.3
    #build = 2892
    reshare = 1
    updateinterval = 240
    minimizecards = 5
    keepconnected = 1
    cccmaxhop = 10
    ignorereshare = 1



    [reader]
    label = viasat
    protocol = mouse
    detect = CD
    enable = 1
    mhz = 357
    cardmhz = 357
    device = /dev/ttyUSB0
    group = 1
    emmcache = 1,3,2
    caid = 093e
    Ident = 093e:000000
    BoxID = XXXXXXXX
    au = viasat
    #ecmwhitelist = 093E:000000::::84,88,98,AA # Viasat 5E
    #blockemm-unknown = 1 # (block all unknown kinds of EMMs)



    [account]
    user = user
    pwd = pass
    group = 1
    monlevel = 0
    au = viasat
    #services = viasat
    caid = 093E
    ident = 093E:000000
    keepalive = 1
    cccmaxhops = 5



    N:127.0.0.1 34000 user pass 01 02 03 04 05 06 07 08 09 10 11 12 13 14 256

    which emu can read the new DigitAlb HD card?
    Is there anyone who has working config to new DigitAlb card


    With Conax cam that came with the card HD channels and the rest ok
    But not with DM. Tested with CCcam and Oscam
    this is Conax cam that came with the card
    NEOTION CI Plus CAM CONAX Secure Chipset Pairing

    Need help with Debian 6 CCcam 2.21
    At last, I have problems as bad command, and remind the peer is on and ofline
    server restarts several times a day by themselves
    With same peer on my dm 7020 no problem
    Have tested all CCcam versions the same thing
    Have changed three different Dell (dual core) computers and reinstalled several times
    There was no problem before what may be can not find what the problem is


    Grateful for any help

    polo1996,
    is this your own opinion or have you just copied from elsewhere?
    Those who have been around have read all these rumors with earlier versions.




    I wrote and asked if this was true for CCcam 230
    one of my peer warned me not to use CCcam 230
    and sent the address of the page
    I was just worried and wanted to know if it was true

    I switched to CCcam 230 had lot of strange things that
    many dubel login bad comands errors. Now I switched back to 2:21 everything went normal agean
    no duble login or other errors
    Can not use 2.13 or 2.14 my viasat card not showing Entitlement info

    Code
    http://pastebin.com/0ZFbh4RX


    CCCAM 2.3.0 is taking the backdoor crap even a step further.

    The lowest scum of the earth, UVADI TEAM, have done it even better this time. Making sure sharing will die for sure if they keep this crap up.

    Before I continue, I would urge people with BRAINS and PROGRAMMING SKILLS, to download IDA PRO (torrent) and decompile it for themselfs to find the fucking remotely triggered backdoor.

    How it works.

    When you install CCcam 2.3.0 , nothing special is happening at first, and cccam will check for input activity on the pc or box to make sure nobody is watching. When it finds itself comfortably alone, it will start sending your ENTIRE CCCAM.CFG info to this IP 176.9.242.159 (a rented root server in germany).
    Now I recompiled a version so I could trigger the backdoor myself, and TADA, some fucking ITALIAN dialup asswipe connected to the server I just set up , IP : 2.32.190.9. So traffic on my card started. THIS THEY CAN NOT HIDE in Cccam, it shows as a CONNECTED CLIENT from one of your clients in cccam.cfg where the dyndns has been removed (still lack of cccam, if dyndns is non-existing) the security feature doesn't work anymore and everybody can connect on that user.

    I have 2 words for UVADI TEAM -> YOU SUCK !!!!!!

    The future of CCcam is dead thanks to these low life asswipes , just after free sharing and making their own "spidernetwork" on your card.

    BLOCK ALL CLIENTS that have 2.3.0 connected to your server as it will still read all connected clients from the server, trough the client !!

    latest original CCcam 2.1.3 and 2.1.4 which are secure and don't have this backdoor code.


    ps: AGAIN , if you don't want to take the warning for granted, decompile and look for yourself !!!!!!!

    U can try this


    1} if you give F: dummy dummy 0 0 0 { 0:0:2 } and user eat big number ecm i think he have payserver or have add big number users.
    2} if you give F: dummy dummy 0 0 0 { 0:0:1 } and user eat big number ecm i think he have add you too CSP or steal your card by oscam or add you to cam who cashe ecm.
    3} if you give F: dummy dummy 0 0 0 { 0:0:0 } and user eat ecm i think he have steal your card

    I have tested almost every image, but Nemesis 4.4 most stable image i ever used
    and easier to config
    Nemesis has standby function in the menu, but no other image has
    Try starting with nemesis 4.4 and scripts I have uploaded, you are not satisfied
    you can switch back.
    Can not remember how it is with pli but Pli has its own map u have to put all in to

    For all nemesis img with CCcam 2.0.11 not tested hd boxes


    1 download CCcam 2.0.11 and install it
    2 from map folder install emustarter.sh ilegal.sh istatistik.sh and CCca_2.0.11_em.sh and replace original in var/script
    3 install init file in var/etc
    4 install rot file in var/spool/cron/crontabs/
    5 edit root file with your boxpass
    6 press blue butom and enable cron ( Start Stop programs )
    7 press blue and red utility button and enable stand by butom
    0,2,4,6,8,10,12,14,16,18,20,22,24,26,28,30,32,34,3 6,38,40,42,44,46,48,50,52,54,56,58 * * * * /var/script/emustarter.sh &
    00 04 * * * reboot &
    05 04 * * * wget -q -O /dev/null http://root:yourboxpass@localhost/cg...ommand=standby
    8 CCcam scipt will check every 2 min if not script will restart cccam
    9 your box will reboot at 04 and go to standby 04.05
    10 all files must attributes ( CHMOD ) with 755
    11 To check if all ok turn of CCcam and wait 2 min u will se cccam will start
    12 in temp folder u can see all logs cccamlog and debug.txt if u have any ilegal user or atacks


    if u need script for cccam 2.21 pm me

    thanks for the answer
    But I only have a few that I have removed and they are blocked, but do not know why the others are ofline it is sama peer who is of all times
    has worked all week without any problems I have not changed anything
    or deleted / added any new peer


    deleted peer that is what I have with iptables-L-n


    root@dyndns:~# iptables -L -n
    Chain INPUT (policy ACCEPT)
    target prot opt source destination
    DROP all -- 94.109.38.xxx 0.0.0.0/0
    DROP all -- 85.229.107.xxx 0.0.0.0/0
    DROP all -- 79.143.177.xxx 0.0.0.0/0

    Need help with my debian server
    do not know if it is my server there is a problem
    or my peers. Every morning some peer are ofline. I reboot and
    some are online but not all
    I use CCcam 2.21 on debian 6

    It becomes more and more complicated oscam tricks N line tricks and lots of other emu Tricks
    since I started with CCcam
    You learn new things every day

    Thanks for the reply
    but I have sent Cline as to all others and DynDNS behind the F line
    it is he who has sent N line.I Have read about Nline and I do not
    send to someone I use only C line
    I use illegal user scripts with CCcam check and baan script on my box
    But it is best to remove his line and stop sharing with him, I think

    I have changed the f-line
    to F: user pass yes {0:0:2} and I see that he is connected
    and testing my card.Hi not complaining, it means he has acces to my card
    but how?
    He has sent N line with *** it card that works without freezing


    I have tested and see that if you use F: user pass yes {0:0:2}
    your peer Reshare your local 8 downhop
    that's the trick with yes

    thanks for the reply
    I sent c line and put the f line in cfg F: user pass 0 0 0 {0:0:2}
    But he wants me to have the f line like this
    F: user pass yes {0:0:2} do not understand why
    The first time I see one with yes istälet 0 0 0
    Perhaps it is a new trick of some kind