Posts by ZaBaLaaa

    Yes, rush1 is right. Every request is hash based, so it's not possible to get the key directly (perhaps through an API, but it's unknown). I'll sniff communication with wireshark when I have time to.

    A possibility would be to setup an own server, that does the job. Currently this is all done manually (pipe .ts to C8 calculator, export C8 to Rainbow Table Tool, export the key to Softcam.Key, restart Oscam). As I already built up a CUDA Server on my Linux Maschine, the key finding was boostet a lot. I get most keys in a few seconds.

    If we had a Enigma plugin for extracting C8 out of .ts and send it to my server, read the key back and update Softcam.key, it could all be done automatically as the BISS autokey function does. We could define the protocols and security ourselfes.

    Someone likes Python programming? ;)

    Hello !

    In first place, thanks for the info, im starting in the feeds world but at the moment im a total noob. Im learning a lot with yours posts.

    I don't know how get a Enigma Plugin but if I can contribute with money to the proyect I would be pleased .

    And I have a little knows about Phyton, perhaps I can contribute programming.

    The project sounds great and if i can cooperate with you and get the passwords automatically i would be very happy.

    Regards.