NDS Card / Oscam - classD3 ins54: no cw --> Card needs pin

Status
Not open for further replies.
any xor calculator will do, even online ...
ok sir .and happand to vast. ai ..
before no issue vast. ai but not giving lof error and some time when i put logs .after that msj come your key find in 12 year .i check many machin but all have same issue .even invida driver also install
 
Hi, I wanted to know if this procedure works on 09cd, (sky it) because I did some tests but the 7e format is different and what is the cw and dcw format to put under brute force, and if the same in this case it is technically possible (perhaps the number of combinations to be searched for increases). This is because I learned that there is 100% sharing for this provider by merchants. Thanks
 
Screenshot-2021-01-20-Telegram-Web
Since no one has given me a hand, I will. This is the crypto system used called "icam" which is inside the broadcom chip and in others, which has been extracted by some hacker teams and even emulated on other processors to be sold. Nobody was able to give indications on the first 2 laps k1 and k2, and then understand how the k3 inside the cpu was calculated? I hope that someone can give an input to be able to work on others as well, apart from the usual 4 traders.
 
Hello guys,

I have a couple of unpaired cards working.
If i get an ECM from an SD channel (that's unpaired) and try to hash it with hashcat it will break K1?
Or just with a working paired card?

Thanks
 
Hello guys,

I have a couple of unpaired cards working.
If i get an ECM from an SD channel (that's unpaired) and try to hash it with hashcat it will break K1?
Or just with a working paired card?

Thanks
which provider?
 
Is the same Possible for the Caid 0911 from TTV 16E Its just the New Genaration of 091F

After Fixing Oscam to Read my Card right and Showing me the Right Entitelments
i Hang on This Points

1 Problem nowhere to find anyone with CAID 0911 for Makind DCW Combination some Peepz have Seen some Caid 0911 Arround
Otherwise i would Try to Check if its Really use 3DES or Not
- Is there any Other way for Pointing me in the Right Direction for the K1

Trying with Fake K1 looks very Promissing
 
help me please..how to calculate boxid..my CAID 0910..image below sample only from my provider
a$tro.jpg

Log :
2021/02/06 12:17:51 657AB9E3 r (reader) phoenix [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=357, cardmhz=357)
2021/02/06 12:17:52 657AB9E3 r (reader) phoenix [mouse] card detected
2021/02/06 12:17:53 657AB9E3 r (reader) phoenix [mouse] ATR: 3F FD 11 25 02 50 80 0F 41 B0 05 69 FF 4A 50 F0 00 00 41 5A 03
2021/02/06 12:17:53 657AB9E3 r (reader) phoenix [mouse] Setting baudrate to 9600 bps
2021/02/06 12:17:55 657AB9E3 r (reader) phoenix [mouse] Card type: AZTV
2021/02/06 12:17:55 657AB9E3 r (reader) phoenix [mouse] Rom version: 20A5
2021/02/06 12:17:55 657AB9E3 r (reader) phoenix [mouse] Credit available on card: 0 euro
2021/02/06 12:17:55 657AB9E3 r (reader) phoenix [mouse] FuseByte: 25
2021/02/06 12:17:55 657AB9E3 r (reader) phoenix [mouse] Region Code: 111110R0
2021/02/06 12:17:55 657AB9E3 r (reader) phoenix [mouse] Country Code: MYS
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [mouse] Pincode read: 0000
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [mouse] PCB settings: FF FF 0 0
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [mouse] type: Video|Guard A|s|t|r|o Malaysia (0910), caid: 0910
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [mouse] serial: ########, BoxID: ########, baseyear: 2004
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [mouse] ready for requests
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [mouse] found card system videoguard2
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] card detected
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] type: Video|Guard A|s|t|r|o Malaysia (0910)
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] ------------------------------------------------------------------
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |- class -|-- tier --|----- valid to ------|--- package name ----|
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] +---------+----------+---------------------+---------------------+
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 00 ---|-- 006c --| 2021/03/14-00:00:00 |
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 00 ---|-- 0066 --| 2021/03/14-00:00:00 |
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 00 ---|-- 00c2 --| 2021/03/14-00:00:00 |
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 00 ---|-- 00ec --| 2021/03/14-00:00:00 |
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 00 ---|-- 00e7 --| 2021/03/14-00:00:00 |
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 00 ---|-- 00f0 --| 2021/03/14-00:00:00 |
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 00 ---|-- 00f3 --| 2021/03/14-00:00:00 |
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 00 ---|-- 00fe --| 2021/03/14-00:00:00 |
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 00 ---|-- 00ff --| 2021/03/14-00:00:00 |
2021/02/06 12:17:56 657AB9E3 r (reader) phoenix [videoguard2] |-- 01 ---|-- 01df --| 2021/03/14-00:00:02 |
2021/02/06 12:17:57 657AB9E3 r (reader) phoenix [videoguard2] ------------------------------------------------------from-ins70--
2021/02/06 12:17:58 00000000 s (main) init for all local cards done
2021/02/06 12:17:58 00000000 s (emmcache) loaded 0 emmcache records from /tmp/.oscam/oscam.emmcache in 0 ms
2021/02/06 12:17:58 00000000 s (emmcache) loaded 0 emmstat records from /tmp/.oscam/oscam.emmstat in 0 ms
2021/02/06 12:17:58 00000000 s (anticasc) anti cascading log initialized
2021/02/06 12:18:00 2328A13E c (client) encrypted cccam-client 192.168.88.22 granted (1234, au=off)
2021/02/06 12:18:22 657AB9E3 r (reader) phoenix [videoguard2] classD3 ins54: no cw --> Card needs pairing/extra data
2021/02/06 12:18:22 2328A13E c (ecm) 1234 (0910@000000/0329/4FBA/B7:552FAA5100A2A4CB1E7478E9FE8188D4:0F0600100000000A:): not found (420 ms) by phoenix
2021/02/06 12:18:22 2328A13E c (ecm) 1234 (0910@000000/0329/4FBA/B7:552FAA5100A2A4CB1E7478E9FE8188D4:0F0600100000000A:): not found (0 ms) by phoenix
2021/02/06 12:18:23 657AB9E3 r (-) -- Skipped 1 duplicated log lines --
2021/02/06 12:18:23 657AB9E3 r (reader) phoenix [videoguard2] classD3 ins54: no cw --> Card needs pairing/extra data
2021/02/06 12:18:23 2328A13E c (ecm) 1234 (0910@000000/0329/4FBA/B7:4B11AAFBE416A9601A12CF0A460161D7:0F0600100000000A:): not found (402 ms) by phoenix
2021/02/06 12:18:23 2328A13E c (ecm) 1234 (0910@000000/0329/4FBA/B7:4B11AAFBE416A9601A12CF0A460161D7:0F0600100000000A:): not found (1 ms) by phoenix
2021/02/06 12:18:24 2328A13E c (-) -- Skipped 2 duplicated log lines --
 
Hi all,

here is one Mini TUTO for TTV caid 091F

- STEP 1 : Find BoxID / you can do it directly with OsCam (i.e. r11581) with option -S ((reader) tTV [internal] serial: 0000XXXX, BoxID: XXXXXXXX, baseyear: 200X)
- STEP 2 : Find ins7e / you can find it via menu and to adapt it in this format 6E736BXXXXXXXXXXXXXXXXXXXXXXXXXX00010202030002020203 ?
- STEP 3 : how to find k1 /
step 3.1 : you need to switch in debug logs 6 via OsCam LiveLog -> Show Settings -> select 2 + 4 (Switch Debug from 6 to) than search for (Search01: crypted CW is: and Search02: ecm hash:) than check Found Only
step 3.2 : check with someone who has a working card :) in order to compare the ECM hash in the same time for the same channel

step 3.3 : once you have one working decrypted CW vs your encrypted CW with the same HASH (the most important thing) you can start DES attack to find your unique k1 via hashcat <hashcat -m 14000 eCW:dCW -o /root/tTV.txt -a 3 -1 /usr/share/hashcat/charsets/DES_full.charset --hex-charset ?1?1?1?1?1?1?1?1 -w 4 --force> (you can use vast.ai to RENT a several GPU configs)

For info : with 8x RTX 2080 Ti k1 was calculated in 1 day, 6 hours on 46.23 % :)))

Many thanks :
- rumas for link to v13 Sky tuto
- rtznfrtz for detailed help and assitance ;) (hvala ti opet kralju)
- Benfica200 for reader-videoguard2.c workaround

Here is the working reader (AU is activated and works very well) :


label = tTV
description = tTV
protocol = internal
device = /dev/sci1
autospeed = 0
caid = 091F
boxid = your 8char boxID as described in STEP 1
ins7e = your 52char ins7e as described in STEP 2
k1_unique = your 16char k1 calculated as described in STEP 3
fix07 = 0
readtiers = 2
detect = cd
mhz = 450
cardmhz = 2700
ident = 091F:000000
group = 1
emmcache = 1,1,3,0
blockemm-unknown = 1
saveemm-unknown = 1
saveemm-u = 1
saveemm-s = 1
disablecrccws = 1


Good luck and have a nice day
- STEP 1 : Find BoxID / you can do it directly with OsCam (i.e. r11581) with option -S ((reader) tTV [internal] serial: 0000XXXX, BoxID: XXXXXXXX, baseyear: 200X)

how to run oscam with option -S ?
 
Either start oscam from the console "e.g. putty" or edit your batch file (shell file) and add -S
 
Cant open Pictures so i would like to join for Helping Find the Right Digits to get it Work

Always get the Message You do not have permission to view this page or perform this action.
 
@

fadyl87

Looked on your Pic your Boxid is no Problem but if you scroll down in that Menue from picture there must be more info
Scroll down on That Page and Look for a Long HEX Number

BOXID

52971>>>3081524497<<<<1
3081524497 in HEX = B7AC5511<<<< BOXID
 
Either start oscam from the console "e.g. putty" or edit your batch file (shell file) and add -S
-S paramerter just display boxid what i have entered in card reader section..

2021/02/07 15:47:34 6A82F8D4 r (reader) Reader-0 [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=357, cardmhz=357)
2021/02/07 15:47:35 6A82F8D4 r (reader) Reader-0 [mouse] card detected
2021/02/07 15:47:36 6A82F8D4 r (reader) Reader-0 [mouse] ATR: 3F FD 11 25 02 50 80 0F 41 B0 05 69 FF 4A 50 F0 00 00 41 5A 03
2021/02/07 15:47:36 6A82F8D4 r (reader) Reader-0 [mouse] Setting baudrate to 9600 bps
2021/02/07 15:47:38 6A82F8D4 r (reader) Reader-0 [mouse] Card type: AZTV
2021/02/07 15:47:38 6A82F8D4 r (reader) Reader-0 [mouse] Rom version: 20A5
2021/02/07 15:47:38 6A82F8D4 r (reader) Reader-0 [mouse] Credit available on card: 0 euro
2021/02/07 15:47:38 6A82F8D4 r (reader) Reader-0 [mouse] FuseByte: 25
2021/02/07 15:47:38 6A82F8D4 r (reader) Reader-0 [mouse] Region Code: 111110R0
2021/02/07 15:47:38 6A82F8D4 r (reader) Reader-0 [mouse] Country Code: MYS
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [mouse] Pincode read: 0000
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [mouse] PCB settings: FF FF 0 0
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [mouse] type: VideoGuard Astro Malaysia (0910), caid: 0910
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [mouse] serial: <smart card num>, BoxID: B7AC5511, baseyear: 2004
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [mouse] ready for requests
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [mouse] found card system videoguard2
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] card detected
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] type: VideoGuard Astro Malaysia (0910)
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] ------------------------------------------------------------------
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |- class -|-- tier --|----- valid to ------|--- package name ----|
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] +---------+----------+---------------------+---------------------+
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 00 ---|-- 006c --| 2021/03/14-00:00:00 |
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 00 ---|-- 0066 --| 2021/03/14-00:00:00 |
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 00 ---|-- 00c2 --| 2021/03/14-00:00:00 |
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 00 ---|-- 00ec --| 2021/03/14-00:00:00 |
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 00 ---|-- 00e7 --| 2021/03/14-00:00:00 |
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 00 ---|-- 00f0 --| 2021/03/14-00:00:00 |
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 00 ---|-- 00f3 --| 2021/03/14-00:00:00 |
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 00 ---|-- 00fe --| 2021/03/14-00:00:00 |
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 00 ---|-- 00ff --| 2021/03/14-00:00:00 |
2021/02/07 15:47:39 6A82F8D4 r (reader) Reader-0 [videoguard2] |-- 01 ---|-- 01df --| 2021/03/14-00:00:02 |
2021/02/07 15:47:40 6A82F8D4 r (reader) Reader-0 [videoguard2] ------------------------------------------------------from-ins70--
2021/02/07 15:47:41 00000000 s (main) init for all local cards done
2021/02/07 15:47:41 00000000 s (emmcache) loading emmcache disabled since no reader is using it!
2021/02/07 15:47:41 00000000 s (emmcache) loading emmstats disabled since no reader is using it!
2021/02/07 15:47:43 36EDFC84 c (client) encrypted cccam-client 192.168.88.22 granted (1234, au=off)
2021/02/07 15:48:04 6A82F8D4 r (reader) Reader-0 [videoguard2] classD3 ins54: no cw --> Card needs pairing/extra data
2021/02/07 15:48:04 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:0195DF8295AC921FDC42815E07537002:0F0600100000000A:): not found (411 ms) by Reader-0
2021/02/07 15:48:04 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:0195DF8295AC921FDC42815E07537002:0F0600100000000A:): not found (1 ms) by Reader-0
2021/02/07 15:48:06 36EDFC84 c (-) -- Skipped 4 duplicated log lines --
2021/02/07 15:48:06 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:0195DF8295AC921FDC42815E07537002:0F0600100000000A:): not found (0 ms) by Reader-0
2021/02/07 15:48:06 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:0195DF8295AC921FDC42815E07537002:0F0600100000000A:): not found (1 ms) by Reader-0
2021/02/07 15:48:06 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:0195DF8295AC921FDC42815E07537002:0F0600100000000A:): not found (0 ms) by Reader-0
2021/02/07 15:48:09 6A82F8D4 r (-) -- Skipped 6 duplicated log lines --
2021/02/07 15:48:09 6A82F8D4 r (reader) Reader-0 [videoguard2] classD3 ins54: no cw --> Card needs pairing/extra data
2021/02/07 15:48:09 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (396 ms) by Reader-0
2021/02/07 15:48:09 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (0 ms) by Reader-0
2021/02/07 15:48:10 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (1 ms) by Reader-0
2021/02/07 15:48:10 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (0 ms) by Reader-0
2021/02/07 15:48:12 36EDFC84 c (-) -- Skipped 7 duplicated log lines --
2021/02/07 15:48:12 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (1 ms) by Reader-0
2021/02/07 15:48:13 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (0 ms) by Reader-0
2021/02/07 15:48:13 36EDFC84 c (-) -- Skipped 1 duplicated log lines --
2021/02/07 15:48:13 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (1 ms) by Reader-0
2021/02/07 15:48:13 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (0 ms) by Reader-0
2021/02/07 15:48:14 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (1 ms) by Reader-0
2021/02/07 15:48:14 36EDFC84 c (ecm) 1234 (0910@000000/0329/4FBA/B7:5598A8C0E75F0883948585E6384157B8:0F0600100000000A:): not found (0 ms) by Reader-0
2021/02/07 15:48:15 6A82F8D4 r (-) -- Skipped 1 duplicated log lines --
 
@

fadyl87

Looked on your Pic your Boxid is no Problem but if you scroll down in that Menue from picture there must be more info
Scroll down on That Page and Look for a Long HEX Number

BOXID

52971>>>3081524497<<<<1
3081524497 in HEX = B7AC5511<<<< BOXID
if i keyin boxid 12345678 also got error classD3 ins54: no cw 😅..
 
if i keyin boxid 12345678 also got error classD3 ins54: no cw 😅..
You Need the Right Ins7E and the Boxid and The K1 Key thats the 3 Things that are Needed for get it work
12345678 is never your Boxid send your Pics from Your Receiver or Write them in PM then i can Get you your Boxid and Ins7e the K1 will be more Complicated to get if that Card is Nowhere in Share if you see it in Share then there is a Chance to get it to work
 
Status
Not open for further replies.
Back
Top