Hi guys, I make all jobs, but Google chrome show only white screen. Internet is ok. I use Virtualbox 7.0 two guests Elementary os and Android 9.0 x86.
Support our site by donate $5 directly to us Thanks!!!
Try StreamFab Downloader and download streaming video from Netflix, Amazon!
Try StreamFab Downloader and download streaming video from Netflix, Amazon!
+ Reply to Thread
Results 481 to 510 of 774
-
-
The Emulator Pie (Android 9) works fine, but Chrome show a blank page if I type in https://plus.rtl.de
All other websites are working fine. I can't update any apps.
I hope, someone can help. Thank you. -
-
I have a similar problem, but only with the page https://plus.rtl.de
It's blank. I exactly followed the instructions of building a cdm. It works fine, but I need the page to be displayed.
All other websites are working fine.
[Attachment 76606 - Click to enlarge]Last edited by banaguitar; 29th Jan 2024 at 22:27.
-
-
-
-
Yeah, I got them on https://bitmovin.com/demos/drm
What is the next step? -
-
I want to download from RTL+. I even have the mpd file and already downloaded the video, now I need the key to decrypt the video:
mp4decrypt --key XXXXXXXXXX input.mp4 output.mp4
What do I have to do now? Thanks for help.Last edited by banaguitar; 29th Jan 2024 at 23:03.
-
You dont need the emulator now, you can just use your browser on your pc.
these threads should help with the next steps:
setting up the scripts
https://forum.videohelp.com/threads/404994-Decryption-and-the-Temple-of-Doom - Decryption section
and more specific help for RTL
https://forum.videohelp.com/threads/412143-Can-someone-help-me-to-download-a-video-from-plus-rtl-de
https://forum.videohelp.com/threads/411044-Downloading-videos-from-RTL -
Thank you for sharing the links. But I need the emulator to generate the two files and then make my own with wkskeys. Is this correct?
-
You need the CDM files that you can dump using this guide. Then you use that CDM in combination with pywidevine/wks-keys/... to perform a request to the license server and get your keys that way. This is not the place for those questions, check the other sticky threads to find more information.
-
- pip install pywidevine
- Create new folder wvd in same folder as dumped files
- pywidevine create-device -k private_key.pem -c client_id.bin -t "ANDROID" -l 3 -o wvd
- load file with l3.py script
Code:# load device device = Device.load(r"path_to_wvd")
-
Hi! I made all guide, but, then i run video in emulator google chrome, script does nothing working.
-
Wow! i got keys, just install android 9.0 pie x86, i don't know, why not working on Android 14 x64_86.
-
There are no key dumpers that claim they can dump keys from Android 14. Highest supported version is 13.
This guide is about dumping your CDM and you did just that, there's nothing else do to except renaming the two files. After this you're ready to use them in your scripts or create a .wvd file. -
Hey all, sorry for my question I'm a pure newbie. I just started downloading MPD's yesterday following Angela's tuto, but I only downloaded from site I already know the keys and that don't have DRM apparently. I don't know how to get the keys for Arte.tv or Auvio.be, do I need to use this android method?
Thank you. -
--[----->+<]>.++++++++++++.---.--------.
[*drm mass downloader: widefrog*]~~~~~~~~~~~[*how to make your own mass downloader: guide*] -
I followed all the steps. I browsed the webpage on emulator: https://bitmovin.com/demos/drm. I got two files: 7283.bin and 7283.json. Instead of a .bin file and .pem file. Also, videos do not showing the visuals, just audio. Am I missing something? (btw I am macOS user and I am using a arm64 emulator)
-
You don't need your own CDM, search the forums: https://forum.videohelp.com/threads/412576-trying-to-download-from-Auvio#post2720391
Again, a simple forum search wouldn't hurt: https://forum.videohelp.com/threads/404219-How-To-Dump-L3-CDM-From-Android-Device-s-(O...e3#post2643969 -
I believe that problem is not that related. frida can detect my device.
Here are the logs:
After I started the dump_keys.py
Code:2024-02-10 12:27:33 PM - root - 16 - INFO - Connected to Android Emulator 5554 2024-02-10 12:27:33 PM - root - 17 - INFO - scanning all processes for the following libraries 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1, name="init", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1086, name="init", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1087, name="init", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1088, name="ueventd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1309, name="logd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1310, name="servicemanager", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1311, name="hwservicemanager", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1312, name="vndservicemanager", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1313, name="android.hardware.keymaster@3.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1314, name="vold", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1363, name="android.hidl.allocator@1.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1364, name="healthd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1365, name="android.hardware.audio@2.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1366, name="android.hardware.broadcastradio@1.1-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1367, name="android.hardware.camera.provider@2.4-service_64", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1368, name="android.hardware.configstore@1.1-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1369, name="android.hardware.drm@1.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1370, name="android.hardware.drm@1.1-service.clearkey", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1371, name="android.hardware.drm@1.1-service.widevine", parameters={}) 2024-02-10 12:27:33 PM - Helpers.Scanner - 82 - INFO - Running libwvhidl.so at 0x75e540a000 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1372, name="android.hardware.gatekeeper@1.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1373, name="android.hardware.gnss@1.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1374, name="android.hardware.graphics.allocator@2.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1376, name="android.hardware.health@2.0-service.goldfish", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1377, name="android.hardware.power@1.1-service.ranchu", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1378, name="android.hardware.sensors@1.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1379, name="android.hardware.wifi@1.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1380, name="hardware.google.media.c2@1.0-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1382, name="qemu-props", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1383, name="audioserver", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1384, name="lmkd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1386, name="thermalserviced", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1387, name="logcat", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1389, name="adbd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1390, name="traced", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1391, name="traced_probes", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1404, name="mdnsd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1532, name="surfaceflinger", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1533, name="zygote64", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1534, name="cameraserver", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1535, name="drmserver", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1536, name="incidentd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1537, name="installd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1538, name="keystore", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1539, name="mediadrmserver", parameters={}) 2024-02-10 12:27:33 PM - Helpers.Scanner - 82 - INFO - Running libmediadrm.so at 0x7bebd9b000 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1540, name="media.extractor", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1541, name="media.metrics", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1542, name="mediaserver", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1543, name="netd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1544, name="statsd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1545, name="storaged", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1546, name="wificond", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1547, name="media.codec", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1548, name="rild", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1550, name="gatekeeperd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1551, name="perfprofd", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1552, name="tombstoned", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1562, name="android.hardware.biometrics.fingerprint@2.1-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1570, name="android.hardware.graphics.composer@2.1-service", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1603, name="iptables-restore", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1604, name="ip6tables-restore", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1629, name="createns", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1643, name="netmgr", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1668, name="dhcpclient", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1681, name="ipv6proxy", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1684, name="hostapd_nohidl", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1686, name="dhcpserver", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1692, name="system_server", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1824, name="com.google.android.inputmethod.latin", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1835, name="com.android.systemui", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1856, name="webview_zygote", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1913, name="com.android.phone", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1980, name="com.google.android.ext.services", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2061, name="wpa_supplicant", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2148, name="com.google.android.gms.persistent", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2192, name="Phone", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2337, name="com.google.android.gms", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2367, name="com.google.process.gservices", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2387, name="Google", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2421, name="com.android.se", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2485, name="com.android.smspush", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2501, name="com.android.launcher3", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2525, name="com.google.android.setupwizard", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2634, name="Photos", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2699, name="com.google.android.googlequicksearchbox:search", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2746, name="com.google.process.gapps", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2933, name="com.android.providers.calendar", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3024, name="Maps", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3088, name="Messages", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3118, name="com.google.android.gms:car", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3241, name="Calendar", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3325, name="Gmail", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3394, name="com.google.android.ims", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3610, name="com.google.android.gms.unstable", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3949, name="com.android.cellbroadcastreceiver", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4033, name="com.android.keychain", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4068, name="android.process.acore", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4203, name="sh", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4205, name="sh", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4213, name="frida-server-16.1.11-android-arm64", parameters={}) 2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4215, name="logcat", parameters={}) 2024-02-10 12:27:33 PM - root - 25 - INFO - Hooks completed
Code:2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMCrypto_GetProvisioningMethod", "payload": { "Method": "OEMCrypto_Keybox" } } 2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMCrypto_GetKeyData", "payload": { "Status": "OEMCrypto_SUCCESS", "Size": 72, "Device_Token": "0000000200001c732429b28b8fa045c0cd5f28e2113f97fd5e8582ced15414e7749d8c68dfa91ea385df0c97f3773c910c328f3c22b31e8ee0ddf3bd988b6b8b8a5f4b9a480c036f" } } 2024-02-10 12:37:59 PM - Helpers.Scanner - 63 - DEBUG - processing device token 2024-02-10 12:37:59 PM - Helpers.Scanner - 174 - INFO - saving key box 2024-02-10 12:37:59 PM - Helpers.Scanner - 177 - DEBUG - saving to key_dumps/Android Emulator 5554/key_boxes/7283 2024-02-10 12:37:59 PM - Helpers.Scanner - 184 - INFO - saved keybox to key_dumps/Android Emulator 5554/key_boxes/7283 2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMCryptoVersion", "payload": { "Version": 13 } } 2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMSecurityLevel", "payload": { "Level": "L3" } } 2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMSecurityLevel", "payload": { "Level": "L3" } } 2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMCrypto_GetProvisioningMethod", "payload": { "Method": "OEMCrypto_Keybox" } } 2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMCrypto_GetKeyData", "payload": { "Status": "OEMCrypto_SUCCESS", "Size": 72, "Device_Token": "0000000200001c732429b28b8fa045c0cd5f28e2113f97fd5e8582ced15414e7749d8c68dfa91ea385df0c97f3773c910c328f3c22b31e8ee0ddf3bd988b6b8b8a5f4b9a480c036f" } } 2024-02-10 12:38:00 PM - Helpers.Scanner - 63 - DEBUG - processing device token 2024-02-10 12:38:00 PM - Helpers.Scanner - 174 - INFO - saving key box 2024-02-10 12:38:00 PM - Helpers.Scanner - 177 - DEBUG - saving to key_dumps/Android Emulator 5554/key_boxes/7283 2024-02-10 12:38:00 PM - Helpers.Scanner - 184 - INFO - saved keybox to key_dumps/Android Emulator 5554/key_boxes/7283 2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMCryptoVersion", "payload": { "Version": 13 } } 2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMSecurityLevel", "payload": { "Level": "L3" } } 2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - { "from": "android.hardware.drm@1.1-service.widevine", "message": "OEMSecurityLevel", "payload": { "Level": "L3" } }
-
Solved the problem. And get the private keys.
Used the following 'dumper' repo: https://github.com/Diazole/dumper rather than proposed on the post(https://github.com/wvdumper/dumper
). BTW: I am a macOS user. Those who have difficulties(especially macOS users) can reach me out via DM. I will be trying to help. -
Hi there, folks! Anyone could potentially help me to get pair or two of those keys for a small donation? I dont have enough skills to get them, but i definitely need them.
Similar Threads
-
Dumping L3 from Android 10, 11 and 12
By Diazole in forum Video Streaming DownloadingReplies: 45Last Post: 9th Jan 2023, 07:13 -
Can you set up a working CDM from an Android device running a custom ROM?
By scryclwn in forum Video Streaming DownloadingReplies: 2Last Post: 27th Nov 2022, 12:46 -
Error getting the keys with dumper, cdm L3 android 9
By Brift_Bv in forum Video Streaming DownloadingReplies: 15Last Post: 23rd Sep 2022, 02:33 -
How To Dump L3 CDM From Android Device's (ONLY Talk About Dumping L3 CDMS)
By Dannyboi in forum Video Streaming DownloadingReplies: 226Last Post: 1st Mar 2022, 03:34 -
How To Dump L1 CDM From Android Device's (ONLY Talk About Dumping L1 CDMS)
By mintolik in forum Video Streaming DownloadingReplies: 13Last Post: 20th Feb 2022, 14:33