Page 1 of 5

OSCAM si card TELEKOM

Posted: 26 Nov 2021 18:16
by ciprysat
A reusit cineva? Am un card activ sa vedem ce iese :hat:



Telekom TV (Romania)) – OSCam

https://trac.streamboard.tv/oscam/ticket/4797#comment:2

exemple here is one Mini TUTO for TTV caid 091F

- STEP 1 : Find BoxID / you can do it directly with OsCam (i.e. r11581) with option -S ((reader) tTV [internal] serial: 0000XXXX, BoxID: XXXXXXXX, baseyear: 200X)
- STEP 2 : Find ins7e / you can find it via menu and to adapt it in this format 6E736BXXXXXXXXXXXXXXXXXXXXXXXXXX00010202030002020203 ?
- STEP 3 : how to find k1 /
step 3.1 : you need to switch in debug logs 6 via OsCam LiveLog -> Show Settings -> select 2 + 4 (Switch Debug from 6 to) than search for (Search01: crypted CW is: and Search02: ecm hash:) than check Found Only
step 3.2 : check with someone who has a working card :) in order to compare the ECM hash in the same time for the same channel
step 3.3 : once you have one working decrypted CW vs your encrypted CW with the same HASH (the most important thing) you can start DES attack to find your unique k1 via hashcat <hashcat -m 14000 eCW:dCW -o /root/tTV.txt -a 3 -1 /usr/share/hashcat/charsets/DES_full.charset --hex-charset ?1?1?1?1?1?1?1?1 -w 4 --force> (you can use vast.ai to RENT a several GPU configs)

For info : with 8x RTX 2080 Ti k1 was calculated in 1 day, 6 hours on 46.23 % :)))

Here is the working reader (AU is activated and works very well) :

label = tTV
description = tTV
protocol = internal
device = /dev/sci1
autospeed = 0
caid = 091F
boxid = your 8char boxID as described in STEP 1
ins7e = your 52char ins7e as described in STEP 2
k1_unique = your 16char k1 calculated as described in STEP 3
fix07 = 0
readtiers = 2
detect = cd
mhz = 450
cardmhz = 2700
ident = 091F:000000
group = 1
emmcache = 1,1,3,0
blockemm-unknown = 1
saveemm-unknown = 1
saveemm-u = 1
saveemm-s = 1
disablecrccws = 1

[reader]
label = TTV
enable = 1
protocol = internal
device = /dev/sci0
disablecrccws_only_for = 091F:000000
caid = 091F
boxid = E11809B5 #exemple
ins7e = 4D00166000000000611809B50000000000010202030002020203 #exemple
k1_generic = 86C1F1CB6DB59740 #exemple
detect = cd
group = 1
blockemm-unknown = 1
blockemm-u = 1
saveemm-u = 1

Or

[reader]
label = TTV
enable = 1
protocol = internal
device = /dev/sci0
disablecrccws_only_for = 091F:000000
caid = 091F
boxid = E11809B5 #exemple
ins7e = 4D00166000000000611809B50000000000010202030002020203 #exemple
k1_unique = 86C1F1CB6DB59740 #exemple
detect = cd
group = 1
blockemm-unknown = 1
blockemm-u = 1
saveemm-u = 1

Re: OSCAM si card TELECOM

Posted: 26 Nov 2021 18:47
by Toor
Cam tarziu prietene,cam tarziu....pentru 39E.Manevra asta se stia de mult si erau publice pe anumite saituri.
Usor si in timp,incet dar sigur,toate canalele trec in Viaccess 6.0 & VideoGuard.
Deja sant cateva,nu o sa le mentionez.Le vei descoperii singur la o scanare. :D

Re: OSCAM si card TELECOM

Posted: 26 Nov 2021 18:54
by ciprysat
Stiu ca sunt publice mai demult. Ai reusit?

Re: OSCAM si card TELECOM

Posted: 27 Nov 2021 07:20
by Toor
Cand toti fug de telepom din cauza pretului la abo. si ca a scos din grila unele prog. bune,tu vrei sa ce?
Ai bine mersii pe 1W aceleasi prog. in afara de Tel. Sp. Si eu cum sant cu sportul....
Tot mai ok e cu un abo. si o cartela oficiala. Dai un ban dar esti sigur de transmisie.

Re: OSCAM si card TELEKOM

Posted: 27 Nov 2021 08:29
by ASiX88796
»
Procedura este folosită la cartelele Sky DE însă merge și la Telekom.
Poți încerca și tu, în scop didactic.
Uite un utilitar: viewtopic.php?f=141&t=3123

NOTĂ:
- CW = Control Word often called DCW (Direct Control Word)
- eCW = encrypted CW
- dCW = decrypted CW

PS: din câte am auzit, la Telekom merge doar pentru CAiD 092F.

Re: OSCAM si card TELEKOM

Posted: 30 Nov 2021 19:34
by ciprysat
Nu inteleg cum pot fi extrase ins7e , k1

ins7e = 4D00166000000000611809B50000000000010202030002020203 #exemple
k1_generic = 86C1F1CB6DB59740 #exemple

2021/11/30 17:30:50 00F1282D r (reader) telekom [videoguard2] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=600, cardmhz=357)
2021/11/30 17:30:50 00F1282D r (reader) telekom [videoguard2] card detected
2021/11/30 17:30:52 00F1282D r (reader) telekom [mouse] ATR: 3F FF 14 25 03 10 80 41 B0 01 69 FF 4A 50 70 00 00 5A 4A 01 00 00
2021/11/30 17:30:52 00F1282D r (reader) telekom [mouse] Setting baudrate to 129032 bps
2021/11/30 17:30:53 00F1282D r (reader) telekom [mouse] Card type: ZJTV
2021/11/30 17:30:53 00F1282D r (reader) telekom [mouse] Rom version: 10A1
2021/11/30 17:30:53 00F1282D r (reader) telekom [mouse] Credit available on card: 0 euro
2021/11/30 17:30:53 00F1282D r (reader) telekom [mouse] classD0 ins36: returned unknown type=0x7F - parsing may fail
2021/11/30 17:30:53 00F1282D r (reader) telekom [mouse] FuseByte: 25
2021/11/30 17:30:53 00F1282D r (reader) telekom [mouse] Region Code: ROM00001
2021/11/30 17:30:53 00F1282D r (reader) telekom [mouse] Country Code: ROM
2021/11/30 17:30:53 00F1282D r (reader) telekom [mouse] Pincode read: 0000
2021/11/30 17:30:53 00F1282D r (reader) telekom [mouse] PCB settings: FF 7F 0 0
2021/11/30 17:30:54 00F1282D r (reader) telekom [mouse] type: VideoGuard Dolce Romania (092F), caid: 092F
2021/11/30 17:30:54 00F1282D r (reader) telekom [mouse] serial: ########, BoxID: ########, baseyear: 2004
2021/11/30 17:30:54 00F1282D r (reader) telekom [mouse] ready for requests
2021/11/30 17:30:54 00F1282D r (reader) telekom [mouse] found card system videoguard2
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] card detected
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] type: VideoGuard Dolce Romania (092F)
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] ------------------------------------------------------------------
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] |- class -|-- tier --|----- valid to ------|--- package name ----|
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] +---------+----------+---------------------+---------------------+
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] |-- 00 ---|-- 006d --| 2021/11/13-00:00:00 |
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] |-- 00 ---|-- 009b --| 2021/11/13-00:00:00 |
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] |-- 00 ---|-- 009e --| 2021/11/13-00:00:00 |
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] |-- 0f ---|-- 0ff3 --| 2021/11/13-00:00:30 |
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] |-- 0f ---|-- 0fff --| 2021/11/13-00:00:30 |
2021/11/30 17:30:54 00F1282D r (reader) telekom [videoguard2] ------------------------------------------------------from-ins70--

Re: OSCAM si card TELEKOM

Posted: 01 Dec 2021 12:41
by raducu73
Salutare
Din cite am auzit eu...trebuie comprimate intr un anume program....si confuguratia pc trebuie foarte puternica

Re: OSCAM si card TELEKOM

Posted: 31 Mar 2022 16:56
by Al3xandru
A reusit vreun suflet binevoitor sa-i dea de cap?
Eu am meciul meu cu astia de la Telekom, banditii au *** **** ********* *** ******** **** *********** ****** ********* ********** ** ********* ******** *** *******.
SI vorba reclamei "pai sa nu le..." :hehih:

Re: OSCAM si card TELEKOM

Posted: 01 Apr 2022 14:16
by Al3xandru
Nu vrea nimeni sa-mi dea o mana de ajutor? (eventual in privat) In linii mari am inteles despre ce e vorba, dar devil is in the details cum se zice...

Re: OSCAM si card TELEKOM

Posted: 01 Apr 2022 21:40
by ASiX88796
»
Ca să primești ajutor trebuie să spui clar ce problema ai.
Eu unul nu am înțeles.
Din câte am citit... ai ********* ** receiver ** ** Telekom... și *** ** ** Telekom ** vor ** **-* ********.