Shame on them! DVB-T spain – Nagravision CAS CAK6 – light pairing.
Shame on them! DVB-T spain – Nagravision CAS CAK6 – light pairing.
The good old Pic´s and Avr are mostly used in hobby projects , but sometimes also in the industrial area. Most of the chip´s dont have a security function, and you can grab all data or you can change it.
If you don´t want the somebody is modify your code there is a dirty trick to get people mad.
Thanks to the Guru 🙂
Building barricades to protect content in the DVB are is not a new thing. It start´s with the used CAS and DRM Restrictions up to hardware pairing to a special vendors box. The first hardware pairing was used with the CAS Betacrypt with the BlueCam. (The BlueCam was an internal CA system that has the option to get paired to the Dbox 1) So to get a system married to a special box isn´t the big finger. The Boxkey system was also used too. It was broken very fast cause the Key itself was stored in a EEPROM inside the STB.
Today it looks like the same security, the only news is that the Key is now stored inside the DVB Core in a special protected OTP area. ST and Broadcom uses this on the newer generation of DVB chipset´s.
What we need to know is:
We have a weakness inside the STB file system. (Plain RSA cert´s). The next stept is we can decrypt the traffic between CI+ HOST and CLIENT. So that makes CI+ nut´s cause it is possible to emulate.
Same on the normal non CI+ version. We can do the man in the middle Attack.
PANIC! But the CW is still encrypted by a heavy encryption system. Is that true?
Maybe it is true?! xD . AES is not broken yet, AES has too much possible Keys that we need to brut force. A Rainbow Table is not useful. 1.1 x 10^77 possible keys on 256 bit that we need to precalculate and have the storage for it. Sounds like petabyte not gigabyte.
But what happens if we can cut the possible keys to 1/2 ? or 1/4?
How? We know the CW is like 2^64 thats arround 18,4 trillion possible control words.
Back to AES… AES is a block cipher.. that means every block has the same size. Thats the differents to a stream cipher. A stream cipher is used in WEP encryption or in RC4. the stream cipher is weak, cause we can find the 3 keys that we need to decrypt the magic. For example the old PDF encryption had a stream cipher with 56 bit. The Key collision to find the magic was pretty fast cracked. Same on 128 bit version by magic Rainbow Tables.
So where the hell is the weakness? CI+ again!
A hint for all those haxxors… i stick 00000000 in and become 128 bit out..?! 128Bit / Known Plaintext= Key .. do it a couple times… and the possible key´s will be reduced!
If „CW“ known compare to reduce more keys!
—————-END OF PREVIEW———-
FULL-PDF use contact! – Only for Companys in Crypto Biz!
Cause LOGIC is a kind that nobody can BUY! It doesn’t matter your study in Cambridge… Logic is something your mother and dad gave you on the DNA! CYA MotherTruckers!
to be updated
Everybody looses a password in his life. Well poop is you do, but i checked the best tools to recover multiple files that was password protected. ….. and yes my own files!
Most passwords in files used in PDF,ZIP,7Zip,Office and some more
I get some PDF and ZIP in the old standard encryption on test.
PDF: 128 bit RC4
Any way before we talk to much. Passware was given me a 1 month serial for the Forensic Studio to test it. Here a nice screenshot …
My aim was to get the best tool that supports speed. So the TOP TEN of Recovery tools are
So we can save cash if we wanna buy a recovery tool. Passware 1000$ + 20 clients = 3000$
So the rest of the tools comes later, first i have to explain a recovery. Don´t waste your money.
If you set a password under 6 chars it can be recovered in minutes. So for all that are sure you used just 6 chars grab some FREEWARE!
The Algo how the password is secure is needed as information. If you have a password like 12345 and hash the password with MD5 it takes a little bit longer to recover it. With a SHA-512 it takes f*ck*ng long time, you can be lucky if you can recover it with good GPU´s.
So next step is what kind of encryption is applied too?! If we talk about DES it doesnt matter, but if AES comes into the game it is a huge differents.
For example we mix SHA512 and AES256 together its a GAME OVER for now. But outside are some weaker mixes.
You are not lost if you want to take a peek in your file, that’s why i tested some tools 🙂
Anyway…. a crypto is just math and can be recovered, but it needs more time. The solution called cluster or cloud cracking it isn’t new. You can also rent EC2 Amazon to crack things.
This setup is a hell-raiser….
Master Server: 2X Intel 16 Cores – 256GB RAM – 4X Nvidia or ATI GFX card´s. The price is arround 8000€ included HDD and stuff.
Clients: just more cores as possible… and a quad SLI Nvidia… the Ram doesnt matter.. 8-16GB.
Open the HELL DOORS use EC2 with 150 Cores and a bunch of GPU power! Ohhh the price isn’t cheap… try to get some 20-30K $ together 🙂
So don’t invest much money into a recovery tool… if you need it ok spend max. 20€/$ for it. The rest can be done by Freeware!
Continue the TOP TEN: 3. low budget application´s and 4. FREEWARE
Facts on my Rig´s local just low budget….. In 1 hour i checked 62 trillions of password´s with a brute force attack.
If you need help… use the contact button 🙂
Der Amiga ist ein paar Tage alt und ist mit den neueren Monitoren nicht mehr kompatible.
Jedoch gibt es eine gute 10×10 cm Lösung aus China, die direkt in den Amiga gebaut werden kann.
Auch YUV kann gewandelt werden. 480i, 576i, 720i, 1080i, 480p, 576p, 720p, 1080p
Nachteil kein HDMI Ausgang, dieser muss extra per Konverter erneut gewandelt werde.
Jetzt ist es soweit, für alle Amiga Fan´s, die noch Zubehör brauchen. Der erste Prototyp des 2er KickRom Umschalter ist in Produktion. Der Preis für die Bauteile sind ca. 3€, dazu kommt noch die Platine.
Die Schaltung basiert auf dem Chip Select Verfahren, via Kippschalter wird das jeweilige ROM ausgewählt und durch ein LED angezeigt. Das LED kann via Kabel direkt in das Oberteil des Gehäuses integriert werden.
Weitere Platinen für den Amiga sind geplant, jedoch wird es etwas Zeit kosten, diese zu verwirklichen.
Die Platine kann unbestückt käuflich erworben werden direkt beim PCB Manufaktur. Der Preis steht noch nicht fest. Ich schätze es wird sich so um die 18€ handeln.
Lieber 18€ wie 35€ bei Ebay gebraucht und in brüchiger alter Gammel Leiterplatte.
PS: Bin an Open Source Hardware für den Amiga interessiert….
A new Amiga Kick Rom switch 1.0 for 3 Rom´s. More Soon….. 2 Kick Rom auto switch….
and a 2 or 3 switch with LCD……
Manufacturer Price at 100 pieces 5€
Manufacturer Price at 50 pieces 7€
Single PCB: 36€
HDCP 2.2 is cracked and bypassed by HDMI splitter´s or converters. Ten years ago the master-key for HDCP was leaked to the net. But why is it bypassed again?
Companies that sell solutions to protect the customers content are high payed and those systems cost´s a bunch of money. But the devil is in the detail. Every crypto is just a layer that prevent´s that normal people can not copy or share the content to each other. If you ask people who are interested in bypassing such protections you find out they are very creative in thinking.
A senior crypto engineer does not check every possible way or worst case scenario. He did what he get payed for and nothing more. There are multiple ways to leak critical information s out of Blueray players or Smart TV´s and more. HDCP we can find on your local computer,beamer,tv…. and set-top boxes.
A company for iptv want to have a cheap and good solution to protect the content. The problem is there is no cheap way… and here begins the problem.
If i wanna have 1 gallon of milk i have to pay the farmer fully. Both sides are happy… i got the fresh milk and he can invest for more stuff in his farm and can survive.
So a design of good hardware depends first on the engineer who did the most work, but the management want to keep the cost´s low to get more profit. The management removes good part´s of the engineers process and replace the part´s with cheap unsecure solutions.
But back to HDCP!
Every who is in digital stuff knows that a flash EEPROM can be dumped. Company´s did this fault every time to rise the profit. A „secure“ flash ic is a bit expensive then a normal one… it´s just penny´s but they calculate in masses.
Possible Attacks are:
After grabbing confidential stuff:
For example HDFury has a down converter from HDCP 2.2 to 1.4 that converts to the compromised version of HDCP. HDFury isnt th the only Manufacturer of such devices.
A Lawsuit against HDFury is on and you get the info here
A HDCP KILLER xD
This happens if you design a system and don´t think about what you do. Those converters bypass the HDCP 2.2 by using a legal for now to make a conversion to HDCP 1.4. A least it´s not forbidden to forget to use the 2.2 version. There is no law in the moment for that. If the use the 2.2 version and remove watermark´s or emulate the crypto it´s a big problem by the law.
I dunno about the other problems like pulling data from a non secured flash or a general IC that is not protected. But i think if is there no protection and i can use the flash ic for another thing i can pull legally the code. Modify the code is a fraud.
Anyway if a secure system alloud´s to get converted it´s not a secure system and a company sold rubbish to the customer. A strict system has not alloud to bypass ohh my mistake … i mean convert. *giggle*
Another HOME MADE PROBLEM…..
Hi, today i wanna talk about the security of 7Zip. If you think 7 Zip is good for you then think about your security. If you wanna encrypt a file with AES you are welcome.
Till today AES is one of the strongest encryption, but be carefull what you do!
7zip generates a SHA256 that has your Password inside.
So far secure if you don’t have arround 120.000€ for a small cluster network. At least a single GPU need 10 years to crack a 7Zip hash that has 8 chars, to cut the time a Cluster and a NAS as collector can split the time to less than 5 years.
Cracking an encryption (the password or key) takes a bunch of time. Why not generate all possible keys and check them? Sure it takes lot´s of space like Petabytes… but once generated it´s faster. Same to the RSA…. generate is faster than tear down to primes.
SHA256 with 5 Chars = 16 Hours on a single GPU.
*Cracking speed of a HASH depens on your local GPU!
Importent is that the SHA256 is based on AES, that means if you use C as password the SHA is always Unique! Make 2 files with the same password…. you will see a different HASH! So if you use the password C often or a name like Mike or Anton it´s easyer to tear down. So the AES function is useless on 7Zip and Winrar. It´s not secure!
Grab a AES encrypter tool… that do not put your password into the archive too!
Using some kind of thoose packers with encryption is like using a known backdoor. Why using a password if it´s inside a file? Make no sense!