Help to extract rsakey e boxkey

Hello guys, how are you? Well, I want to know a little more about conax.
 
Did anyone write anything here about conax 😜

Cau Adas
 
here's the bin
 

Attachments

  • bin conax.rar
    45.4 MB · Views: 13
  • bin conax.rar
    45.4 MB · Views: 11
1.BIN
16777472 Bytes
16384 Kb
Hex 0x1000100

Searching... 0x 0000016C
String was found at offset 0xF64FA7
String length 0x200
String was found at offset 0xF673CB
String length 0x200
 
1.BIN
16777472 Bytes
16384 Kb
Hex 0x1000100

Searching... 0x 0000016C
String was found at offset 0xF64FA7
String length 0x200
String was found at offset 0xF673CB
String length 0x200
It's not about nagra but conax
 
Your provider uses chipset pairing like 90% of the paired conax providers nowaways. Unless you have access to private exploits and confidential code for this SOC you can stop wasting your time.

There is nothing inside the dump which is of any use for solving that.
 
Your provider uses chipset pairing like 90% of the paired conax providers nowaways. Unless you have access to private exploits and confidential code for this SOC you can stop wasting your time.

There is nothing inside the dump which is of any use for solving that.
don't say that my brother, there are several working cards, and they usually work with 32 codes
 
Guys I’m back, I’m trying viacess version 6 it’s been difficult for me to extract keys

Does anyone know how I can do this
 
Back
Top