VideoHelp Forum


Try StreamFab Downloader and download from Netflix, Amazon, Youtube! Or Try DVDFab and copy Blu-rays! or rip iTunes movies!


Try StreamFab Downloader and download streaming video from Youtube, Netflix, Amazon! Download free trial.


+ Reply to Thread
Results 1 to 16 of 16
Thread
  1. Good evening, I wanted to comment on the error that is happening to me when extracting the keys from a cdm L3, these are the DRM specifications:
    Image
    [Attachment 65822 - Click to enlarge]

    I am using python 3.10, dumper and frida server 15.1.28 (latest version just released 2 days ago)
    This is what cmd shows when running the dump_keys script:
    2022-07-08 07:17:42 PM - root - 16 - INFO - Connected to Redmi 7A
    2022-07-08 07:17:42 PM - root - 17 - INFO - scanning all processes for the following libraries
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=1, name="init", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=392, name="init", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=393, name="init", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=394, name="ueventd", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=433, name="mqsasd", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=436, name="logd", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=437, name="servicemanager", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=438, name="hwservicemanager", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=439, name="vndservicemanager", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=448, name="qseecomd", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=460, name="android.hardware.gatekeeper@1.0-service-qti", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=461, name="android.hardware.keymaster@4.0-service-qti", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=462, name="vold", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=480, name="magiskd", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=517, name="netd", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=518, name="zygote", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=575, name="android.hardware.audio@2.0-service", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=576, name="android.hidl.allocator@1.0-service", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=577, name="displayfeaturecontrol", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=578, name="healthd", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=579, name="android.hardware.bluetooth@1.0-service-qti", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=580, name="android.hardware.camera.provider@2.4-service", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=581, name="android.hardware.cas@1.0-service", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=582, name="android.hardware.configstore@1.1-service", parameters={})
    2022-07-08 07:17:43 PM - root - 19 - DEBUG - Process(pid=584, name="android.hardware.drm@1.1-service.clearkey", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=586, name="android.hardware.graphics.allocator@2.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=587, name="android.hardware.graphics.composer@2.1-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=588, name="android.hardware.health@2.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=589, name="android.hardware.light@2.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=590, name="android.hardware.memtrack@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=591, name="android.hardware.power@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=592, name="android.hardware.sensors@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=593, name="android.hardware.thermal@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=595, name="android.hardware.usb@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=596, name="android.hardware.vibrator@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=597, name="android.hardware.wifi@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=598, name="vendor.display.color@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=599, name="vendor.qti.esepowermanager@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=600, name="vendor.qti.gnss@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=601, name="vendor.qti.hardware.alarm@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=602, name="vendor.qti.hardware.perf@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=603, name="vendor.qti.hardware.qdutils_disp@1.0-service-qti", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=604, name="vendor.qti.hardware.qteeconnector@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=605, name="vendor.qti.hardware.soter@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=606, name="vendor.qti.hardware.tui_comm@1.0-service-qti", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=607, name="vendor.xiaomi.hardware.misys@1.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=608, name="vendor.xiaomi.hardware.misys@2.0-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=609, name="mlipayd@1.1", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=610, name="mtd@1.2", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=613, name="tidad@1.1", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=614, name="vsimd", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=616, name="qrtr-ns", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=618, name="rmt_storage", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=619, name="tftp_server", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=621, name="charge_logger", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=623, name="pm-service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=626, name="audioserver", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=627, name="lmkd", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=628, name="surfaceflinger", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=629, name="thermalserviced", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=664, name="sensors.qti", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=691, name="mm-pp-dpps", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=692, name="pm-proxy", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=699, name="cnd", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=700, name="dpmQmiMgr", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=701, name="time_daemon", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=702, name="thermal-engine", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=705, name="wcnss_service", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=710, name="adsprpcd", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=711, name="hvdcp_opti", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=713, name="shelld", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=715, name="fdpp", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=719, name="cameraserver", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=722, name="displayfeature", parameters={})
    2022-07-08 07:17:44 PM - root - 19 - DEBUG - Process(pid=723, name="drmserver", parameters={})
    2022-07-08 07:17:45 PM - Helpers.Scanner - 82 - INFO - Running libmediadrm.so at 0xaa912000
    2022-07-08 07:17:45 PM - root - 19 - DEBUG - Process(pid=724, name="incidentd", parameters={})
    2022-07-08 07:17:45 PM - root - 19 - DEBUG - Process(pid=726, name="installd", parameters={})
    2022-07-08 07:17:45 PM - root - 19 - DEBUG - Process(pid=728, name="keystore", parameters={})
    2022-07-08 07:17:45 PM - root - 19 - DEBUG - Process(pid=729, name="mediadrmserver", parameters={})
    2022-07-08 07:17:46 PM - Helpers.Scanner - 82 - INFO - Running libmediadrm.so at 0xb1814000
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=730, name="media.extractor", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=731, name="media.metrics", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=732, name="mediaserver", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=733, name="miuibooster", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=734, name="perfservice", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=735, name="statsd", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=736, name="storaged", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=738, name="wificond", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=739, name="media.codec", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=740, name="wifidisplayhalservice", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=755, name="cnss-daemon", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=757, name="ssgqmigd", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=761, name="ssgtzd", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=762, name="mlid", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=763, name="loc_launcher", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=773, name="dpmd", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=774, name="gatekeeperd", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=777, name="tombstoned", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=832, name="lowi-server", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=840, name="xtwifi-inet-agent", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=841, name="xtwifi-client", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=842, name="slim_daemon", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=843, name="xtra-daemon", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=868, name="dpmd", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=951, name="imsqmidaemon", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=954, name="com.qualcomm.qcrilmsgtunnel", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=957, name="ATFWD-daemon", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=974, name="msm_irqbalance", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1030, name="imsdatadaemon", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1034, name="qcrild", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1041, name="ipacm-diag", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1048, name="ipacm", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1054, name="qcrild", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1064, name="qti", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1072, name="netmgrd", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1075, name="port-bridge", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1108, name="com.lbe.security.miui", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1202, name="com.xiaomi.xmsf", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1250, name="imsrcsd", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1401, name="system_server", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1489, name="ims_rtp_daemon", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1780, name="com.android.systemui", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1788, name="webview_zygote", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1853, name="iptables-restore", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=1858, name="ip6tables-restore", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2082, name=".dataservices", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2096, name="com.qualcomm.qti.telephonyservice", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2106, name="se.dirac.acs", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2122, name="com.android.phone", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2135, name="com.miui.home", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2494, name="mcd", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2787, name="cnss_diag", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2807, name="Google", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2825, name="com.huaqin.sarcontroller", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2836, name="com.miui.daemon", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2856, name="com.android.se", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2873, name="com.xiaomi.xmsfkeeper", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2889, name="com.xiaomi.finddevice", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2912, name="com.qualcomm.qti.services.secureuiui_service", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=2934, name="com.miui.face", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=3303, name="com.xiaomi.location.fused", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=3474, name="Seguridad", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=4253, name="com.miui.wmsvc", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=4537, name="com.xiaomi.joyose", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=6274, name="tcpdump", parameters={})
    2022-07-08 07:17:46 PM - root - 19 - DEBUG - Process(pid=10772, name="android.hardware.drm@1.0-service", parameters={})
    2022-07-08 07:17:47 PM - Helpers.Scanner - 82 - INFO - Running libwvdrmengine.so at 0xaab21000
    2022-07-08 07:17:48 PM - root - 19 - DEBUG - Process(pid=12700, name="android.hardware.drm@1.1-service.widevine", parameters={})
    2022-07-08 07:17:49 PM - Helpers.Scanner - 82 - INFO - Running libwvhidl.so at 0xac44c000
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=14857, name="wpa_supplicant", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=18697, name="com.google.process.gservices", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=18842, name="com.miui.msa.global", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=18905, name="com.miui.analytics", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=19004, name="com.android.smspush", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=19024, name="com.google.android.ext.services", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=22022, name="com.google.android.gms", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=22065, name="com.google.android.gms.persistent", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=26927, name="com.google.android.inputmethod.latin", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=27147, name="Google*Play*Store", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=27850, name="com.qti.diagservices", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=28081, name="com.huaqin.diaglogger", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=28405, name="com.android.chromeandboxed_process0", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=28490, name="com.xiaomi.mi_connect_service", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=28510, name="mdnsd", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=28856, name="adbd", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=29053, name="com.miui.powerkeeper", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=29361, name="com.google.android.googlequicksearchboxearch", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=29377, name="com.mi.android.globalminusscreen", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=29415, name="Discord", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=29589, name="logcat", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=29611, name="com.huaqin.sarcontroller:controller", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30066, name="com.google.process.gapps", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30244, name="Galería", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30561, name="com.google.android.partnersetup", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30570, name="YouTube", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30583, name="Google Play Películas", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30602, name="com.miui.android.fashiongallery", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30845, name="sh", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30847, name="su", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30851, name="-", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30871, name="Magisk", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30890, name="su", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30893, name="libbusybox.so", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=30901, name="com.topjohnwu.magisk:root", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31091, name="frida-server-15.1.28-android-arm", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31093, name="logcat", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31155, name="Tiempo", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31202, name="Configuración", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31238, name="Cámara", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31278, name="com.android.chrome", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31339, name="com.android.providers.partnerbookmarks", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31385, name="com.android.chromerivileged_process0", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31480, name="com.qualcomm.telephony", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31628, name="com.android.chromeandboxed_process5", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31659, name="com.google.android.inputmethod.latin:train", parameters={})
    2022-07-08 07:17:49 PM - root - 19 - DEBUG - Process(pid=31703, name="Chrome", parameters={})
    2022-07-08 07:17:49 PM - root - 25 - INFO - Hooks completed
    And this is what I get in cmd after playing the content:
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_Keybox"
    }
    }
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetKeyData",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Size": 72,
    "Device_Token": "000000020000115d16406c367c1abaf696d2057237c9f33a6 a3a5c6f7e54120639993715e225d793fac40a952b7b08d8b46 94aba743aca1da6b91678be939c5de14f23c16367ad34"
    }
    }
    2022-07-08 07:20:16 PM - Helpers.Scanner - 63 - DEBUG - processing device token
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 13
    }
    }
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_Keybox"
    }
    }
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetKeyData",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Size": 72,
    "Device_Token": "000000020000115d16406c367c1abaf696d2057237c9f33a6 a3a5c6f7e54120639993715e225d793fac40a952b7b08d8b46 94aba743aca1da6b91678be939c5de14f23c16367ad34"
    }
    }
    2022-07-08 07:20:16 PM - Helpers.Scanner - 63 - DEBUG - processing device token
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 13
    }
    }
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2022-07-08 07:20:16 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2022-07-08 07:20:38 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_Keybox"
    }
    }
    2022-07-08 07:20:38 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetKeyData",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Size": 72,
    "Device_Token": "000000020000115d16406c367c1abaf696d2057237c9f33a6 a3a5c6f7e54120639993715e225d793fac40a952b7b08d8b46 94aba743aca1da6b91678be939c5de14f23c16367ad34"
    }
    }
    2022-07-08 07:20:38 PM - Helpers.Scanner - 63 - DEBUG - processing device token
    2022-07-08 07:20:38 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 13
    }
    }
    2022-07-08 07:20:38 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2022-07-08 07:20:39 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2022-07-08 07:20:39 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2022-07-08 07:20:45 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 13
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_Keybox"
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetKeyData",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Size": 72,
    "Device_Token": "000000020000115d16406c367c1abaf696d2057237c9f33a6 a3a5c6f7e54120639993715e225d793fac40a952b7b08d8b46 94aba743aca1da6b91678be939c5de14f23c16367ad34"
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 63 - DEBUG - processing device token
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 13
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 13
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_Keybox"
    }
    }
    2022-07-08 07:20:54 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.1-service.widevine",
    "message": "OEMCrypto_GetKeyData",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Size": 72
    And then it generates two files, one in .bin format and the other in .json format, each one with a weight of 1 kb
    What I did now is fix the dynamic functions issue and use a root file manager and find the file called libwvhidl.so, make a copy and send it to my computer then open it with notepad and find the sequence:
    ayhdibat dmmsiebq eobcndfr ewpdkrfk fniukbqf gnftsluk gpibpaia hiseddqu isyowgmp jmpmhuxl jpdrnrox nqfnfdzo ofcfxqpn oipohlin pwunvoqt qvvmsfbu shxwbntk tzvleddp utdmsvht vfmxioyc wfhamgxt
    Edit the script.js file and in the first line put all the sequences that you take from the libwvhidl.so file and it looks like this:
    const KNOWN_DYNAMIC_FUNC = ['ulns', 'ayhdibat', 'dmmsiebq', 'eobcndfr', 'ewpdkrfk', 'fniukbqf', 'gnftsluk', 'gpibpaia', 'hiseddqu', 'isyowgmp', 'jmpmhuxl', 'jpdrnrox', 'nqfnfdzo', 'ofcfxqpn', 'oipohlin', 'pwunvoqt', 'qvvmsfbu', 'shxwbntk', 'tzvleddp', 'utdmsvht', 'vfmxioyc', 'wfhamgxt']
    After editing it, try again with cmd and this came out executing the dump_keys script without reproducing anything yet:
    Image
    [Attachment 65824 - Click to enlarge]
    Image
    [Attachment 65825 - Click to enlarge]
    Image
    [Attachment 65826 - Click to enlarge]
    Image
    [Attachment 65827 - Click to enlarge]
    Image
    [Attachment 65828 - Click to enlarge]
    Image
    [Attachment 65829 - Click to enlarge]
    Image
    [Attachment 65830 - Click to enlarge]

    If someone could help me please I would appreciate it, as I repeat I have android 9 with OEM crypto version 13 and L1 downgraded to L3 through magisk, I run frida from the computer to the mobile and use python 3.10.
    Quote Quote  
  2. Originally Posted by libero08 View Post
    You have PM!
    Thank you very much libero08, now if I manage to extract the cdm, thank you very much for your help and your advice
    Last edited by Brift_Bv; 9th Jul 2022 at 12:14.
    Quote Quote  
  3. well i am glad to see you solve the issues asap!
    Quote Quote  
  4. Well it solves the OP's issue but doesn't help anyone else in their pursuit on the forum. Completely selfish attitudes.
    Quote Quote  
  5. This argument was already threated in this forum , time ago in another topic. So if someone use "search lens" will find the answer without opening many topics!
    Quote Quote  
  6. Completely selfish by OP and yourself.
    Quote Quote  
  7. Well, i am not selfish, but i repeat argument was threathing some time ago Here on forum!

    I am, not selfish, escuse me , but when i ask you for help private you block me with no reason, or you already forgot ?
    Quote Quote  
  8. Listen, I dont need help dumping a L3, but other users obviously do. So by not supplying the solution in public you ARE completely selfish.

    I haven't blocked you on here or on Discord, I told you I cannot assist you with php.
    Quote Quote  
  9. I hope now all members here will be soddisfied.
    Tre real problem is , people came here and open new topic but don't do a research first, maybe can found an answer on their issues.
    PS:
    Maybe if i ask you to help me with python you will unblock me
    Quote Quote  
  10. OP has tried every other recommendation from what I have read here on forum and known.
    • API v13 or less
    • Downgrade L1 to L3
    • Finding dynamic function (guide shared by [ss]vegeta) and using it
    Other thing people have confirmed success which OP didn't tried was using different python version beside v3.10, frida v15.1.17, or using older Android versions like v7-8.
    Quote Quote  
  11. I have a rooted Xiaomi Note 8T which has Android 11
    to dump my L3 CDM, I installed Frida and liboemcrypto disabler and all the python packages which are needed
    also I found all the functions in the libwhhidl.so and added them to the script.js
    and guess what? i was unsuccessful in dumping my CDM!
    so what is wrong?
    anyone who can help, it will be appreciated

    Image
    [Attachment 66927 - Click to enlarge]

    Image
    [Attachment 66928 - Click to enlarge]

    Image
    [Attachment 66929 - Click to enlarge]

    Image
    [Attachment 66930 - Click to enlarge]
    Quote Quote  
  12. You maybe do not read here, and other topic regarding this kind of operation!
    Remove liboemcrypto from your device reboot phone, start again frida and geet your keys!
    Quote Quote  
  13. Originally Posted by libero08 View Post
    You maybe do not read here, and other topic regarding this kind of operation!
    Remove liboemcrypto from your device reboot phone, start again frida and geet your keys!
    I did this before, It will give me just key boxes! no private key or client id
    Quote Quote  
  14. Originally Posted by mostafasmh1996 View Post
    Originally Posted by libero08 View Post
    You maybe do not read here, and other topic regarding this kind of operation!
    Remove liboemcrypto from your device reboot phone, start again frida and geet your keys!
    I did this before, It will give me just key boxes! no private key or client id
    I don't encounter this so I don't know but as I remember you must bring that oemcrypto level from 16 to 13 for it to work, maybe a little search through the forums?
    Quote Quote  
  15. Originally Posted by gadumuc View Post
    Originally Posted by mostafasmh1996 View Post
    Originally Posted by libero08 View Post
    You maybe do not read here, and other topic regarding this kind of operation!
    Remove liboemcrypto from your device reboot phone, start again frida and geet your keys!
    I did this before, It will give me just key boxes! no private key or client id
    I don't encounter this so I don't know but as I remember you must bring that oemcrypto level from 16 to 13 for it to work, maybe a little search through the forums?
    Oh! didn't know that
    Thank you
    Quote Quote  



Similar Threads

Visit our sponsor! Try DVDFab and backup Blu-rays!