VideoHelp Forum



Support our site by donate $5 directly to us Thanks!!!

Try StreamFab Downloader and download streaming video from Netflix, Amazon!



+ Reply to Thread
Page 17 of 26
FirstFirst ... 7 15 16 17 18 19 ... LastLast
Results 481 to 510 of 774
  1. Hi guys, I make all jobs, but Google chrome show only white screen. Internet is ok. I use Virtualbox 7.0 two guests Elementary os and Android 9.0 x86.
    Quote Quote  
  2. Member
    Join Date
    Sep 2022
    Location
    Germany
    Search PM
    The Emulator Pie (Android 9) works fine, but Chrome show a blank page if I type in https://plus.rtl.de
    All other websites are working fine. I can't update any apps.
    I hope, someone can help. Thank you.
    Quote Quote  
  3. Originally Posted by Karoolus View Post
    Originally Posted by PSXman_uk View Post
    Do you use the same Vm for each set of keys or new vm each time
    with VM you mean Android AVD?

    Yes same AVD Device or do you create multiple devices
    Quote Quote  
  4. Member
    Join Date
    Sep 2022
    Location
    Germany
    Search PM
    Originally Posted by Cryosim View Post
    Hi guys, I make all jobs, but Google chrome show only white screen. Internet is ok. I use Virtualbox 7.0 two guests Elementary os and Android 9.0 x86.
    I have a similar problem, but only with the page https://plus.rtl.de
    It's blank. I exactly followed the instructions of building a cdm. It works fine, but I need the page to be displayed.
    All other websites are working fine.

    Image
    [Attachment 76606 - Click to enlarge]
    Last edited by banaguitar; 29th Jan 2024 at 22:27.
    Quote Quote  
  5. Originally Posted by banaguitar View Post
    Originally Posted by Cryosim View Post
    Hi guys, I make all jobs, but Google chrome show only white screen. Internet is ok. I use Virtualbox 7.0 two guests Elementary os and Android 9.0 x86.
    I have a similar problem, but only with the page https://plus.rtl.de
    It's blank. I exactly followed the instructions of building a cdm. It works fine, but I need the page to be displayed.
    All other websites are working fine.
    if youve already got the cdm files extracted why do you need the rtl page to load?
    Quote Quote  
  6. Search, Learn, Download! Karoolus's Avatar
    Join Date
    Oct 2022
    Location
    Belgium
    Search Comp PM
    Originally Posted by PSXman_uk View Post
    Originally Posted by Karoolus View Post
    Originally Posted by PSXman_uk View Post
    Do you use the same Vm for each set of keys or new vm each time
    with VM you mean Android AVD?

    Yes same AVD Device or do you create multiple devices

    New AVD for every CDM you want to dump
    Quote Quote  
  7. Member
    Join Date
    Sep 2022
    Location
    Germany
    Search PM
    Originally Posted by ElCap View Post
    Originally Posted by banaguitar View Post
    Originally Posted by Cryosim View Post
    Hi guys, I make all jobs, but Google chrome show only white screen. Internet is ok. I use Virtualbox 7.0 two guests Elementary os and Android 9.0 x86.
    I have a similar problem, but only with the page https://plus.rtl.de
    It's blank. I exactly followed the instructions of building a cdm. It works fine, but I need the page to be displayed.
    All other websites are working fine.
    if youve already got the cdm files extracted why do you need the rtl page to load?
    I don't have them, only set up the AVD with the dumper which works fine.
    Quote Quote  
  8. Originally Posted by banaguitar View Post
    Originally Posted by ElCap View Post
    Originally Posted by banaguitar View Post
    Originally Posted by Cryosim View Post
    Hi guys, I make all jobs, but Google chrome show only white screen. Internet is ok. I use Virtualbox 7.0 two guests Elementary os and Android 9.0 x86.
    I have a similar problem, but only with the page https://plus.rtl.de
    It's blank. I exactly followed the instructions of building a cdm. It works fine, but I need the page to be displayed.
    All other websites are working fine.
    if youve already got the cdm files extracted why do you need the rtl page to load?
    I don't have them, only set up the AVD with the dumper which works fine.
    im confused, do you have these files:
    device_client_id_blob
    device_private_key
    Quote Quote  
  9. Member
    Join Date
    Sep 2022
    Location
    Germany
    Search PM
    Yeah, I got them on https://bitmovin.com/demos/drm
    What is the next step?
    Quote Quote  
  10. Originally Posted by banaguitar View Post
    Yeah, I got them on https://bitmovin.com/demos/drm
    so you have the cdm files, what are you trying to get now?
    Quote Quote  
  11. Member
    Join Date
    Sep 2022
    Location
    Germany
    Search PM
    I want to download from RTL+. I even have the mpd file and already downloaded the video, now I need the key to decrypt the video:
    mp4decrypt --key XXXXXXXXXX input.mp4 output.mp4
    What do I have to do now? Thanks for help.
    Last edited by banaguitar; 29th Jan 2024 at 23:03.
    Quote Quote  
  12. Originally Posted by banaguitar View Post
    I want to download from RTL+. I even have the mpd file and already downloaded the video, now I need the key to decrypt the video:
    mp4decrypt --key XXXXXXXXXX input.mp4 output.mp4
    What do I have to do now? Thanks for help.
    You dont need the emulator now, you can just use your browser on your pc.

    these threads should help with the next steps:
    setting up the scripts
    https://forum.videohelp.com/threads/404994-Decryption-and-the-Temple-of-Doom - Decryption section

    and more specific help for RTL
    https://forum.videohelp.com/threads/412143-Can-someone-help-me-to-download-a-video-from-plus-rtl-de
    https://forum.videohelp.com/threads/411044-Downloading-videos-from-RTL
    Quote Quote  
  13. Member
    Join Date
    Sep 2022
    Location
    Germany
    Search PM
    Thank you for sharing the links. But I need the emulator to generate the two files and then make my own with wkskeys. Is this correct?
    Quote Quote  
  14. Search, Learn, Download! Karoolus's Avatar
    Join Date
    Oct 2022
    Location
    Belgium
    Search Comp PM
    Originally Posted by banaguitar View Post
    Thank you for sharing the links. But I need the emulator to generate the two files and then make my own with wkskeys. Is this correct?
    You need the CDM files that you can dump using this guide. Then you use that CDM in combination with pywidevine/wks-keys/... to perform a request to the license server and get your keys that way. This is not the place for those questions, check the other sticky threads to find more information.
    Quote Quote  
  15. Member
    Join Date
    Sep 2022
    Location
    Germany
    Search PM
    Yes, that's what I mean
    Quote Quote  
    1. pip install pywidevine
    2. Create new folder wvd in same folder as dumped files
    3. pywidevine create-device -k private_key.pem -c client_id.bin -t "ANDROID" -l 3 -o wvd
    4. load file with l3.py script

    Code:
    # load device
    device = Device.load(r"path_to_wvd")
    Quote Quote  
  16. Hi! I made all guide, but, then i run video in emulator google chrome, script does nothing working.
    Image Attached Thumbnails Click image for larger version

Name:	2024-02-01 (1).png
Views:	120
Size:	72.8 KB
ID:	76687  

    Click image for larger version

Name:	2024-02-01 (2).png
Views:	109
Size:	98.5 KB
ID:	76688  

    Click image for larger version

Name:	2024-02-01 (3).png
Views:	53
Size:	382.9 KB
ID:	76689  

    Quote Quote  
  17. Originally Posted by Cryosim View Post
    Hi! I made all guide, but, then i run video in emulator google chrome, script does nothing working.

    Pmed you
    Quote Quote  
  18. Wow! i got keys, just install android 9.0 pie x86, i don't know, why not working on Android 14 x64_86.
    Quote Quote  
  19. So, I get keys client_id.bin
    private_key.pem
    What are my next steps?
    Quote Quote  
  20. Search, Learn, Download! Karoolus's Avatar
    Join Date
    Oct 2022
    Location
    Belgium
    Search Comp PM
    Originally Posted by Cryosim View Post
    So, I get keys client_id.bin
    private_key.pem
    What are my next steps?
    Read the other sticky threads
    Quote Quote  
  21. Originally Posted by Cryosim View Post
    Wow! i got keys, just install android 9.0 pie x86, i don't know, why not working on Android 14 x64_86.
    There are no key dumpers that claim they can dump keys from Android 14. Highest supported version is 13.

    Originally Posted by Cryosim View Post
    So, I get keys client_id.bin
    private_key.pem
    What are my next steps?
    This guide is about dumping your CDM and you did just that, there's nothing else do to except renaming the two files. After this you're ready to use them in your scripts or create a .wvd file.
    Quote Quote  
  22. Hey all, sorry for my question I'm a pure newbie. I just started downloading MPD's yesterday following Angela's tuto, but I only downloaded from site I already know the keys and that don't have DRM apparently. I don't know how to get the keys for Arte.tv or Auvio.be, do I need to use this android method?

    Thank you.
    Quote Quote  
  23. Feels Good Man 2nHxWW6GkN1l916N3ayz8HQoi's Avatar
    Join Date
    Jan 2024
    Location
    Pepe Island
    Search Comp PM
    Originally Posted by Vakarm View Post
    I don't know how to get the keys for Arte.tv or Auvio.be, do I need to use this android method?
    Arte.tv has DRM protection? I checked and the videos can be downloaded directly using the m3u8 files. Does it have some specific videos with drm?
    --[----->+<]>.++++++++++++.---.--------.
    [*drm mass downloader: widefrog*]~~~~~~~~~~~[*how to make your own mass downloader: guide*]
    Quote Quote  
  24. Member
    Join Date
    Feb 2024
    Location
    Turkey
    Search Comp PM
    I followed all the steps. I browsed the webpage on emulator: https://bitmovin.com/demos/drm. I got two files: 7283.bin and 7283.json. Instead of a .bin file and .pem file. Also, videos do not showing the visuals, just audio. Am I missing something? (btw I am macOS user and I am using a arm64 emulator)
    Quote Quote  
  25. Originally Posted by Vakarm View Post
    Hey all, sorry for my question I'm a pure newbie. I just started downloading MPD's yesterday following Angela's tuto, but I only downloaded from site I already know the keys and that don't have DRM apparently. I don't know how to get the keys for Arte.tv or Auvio.be, do I need to use this android method?

    Thank you.
    You don't need your own CDM, search the forums: https://forum.videohelp.com/threads/412576-trying-to-download-from-Auvio#post2720391

    Originally Posted by doganjr View Post
    I followed all the steps. I browsed the webpage on emulator: https://bitmovin.com/demos/drm. I got two files: 7283.bin and 7283.json. Instead of a .bin file and .pem file. Also, videos do not showing the visuals, just audio. Am I missing something? (btw I am macOS user and I am using a arm64 emulator)
    Again, a simple forum search wouldn't hurt: https://forum.videohelp.com/threads/404219-How-To-Dump-L3-CDM-From-Android-Device-s-(O...e3#post2643969
    Quote Quote  
  26. Member
    Join Date
    Feb 2024
    Location
    Turkey
    Search Comp PM
    Originally Posted by white_snake View Post
    Originally Posted by doganjr View Post
    I followed all the steps. I browsed the webpage on emulator: https://bitmovin.com/demos/drm. I got two files: 7283.bin and 7283.json. Instead of a .bin file and .pem file. Also, videos do not showing the visuals, just audio. Am I missing something? (btw I am macOS user and I am using a arm64 emulator)
    Again, a simple forum search wouldn't hurt: https://forum.videohelp.com/threads/404219-How-To-Dump-L3-CDM-From-Android-Device-s-(O...e3#post2643969
    I believe that problem is not that related. frida can detect my device.

    Here are the logs:

    After I started the dump_keys.py

    Code:
    2024-02-10 12:27:33 PM - root - 16 - INFO - Connected to Android Emulator 5554
    2024-02-10 12:27:33 PM - root - 17 - INFO - scanning all processes for the following libraries
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1, name="init", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1086, name="init", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1087, name="init", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1088, name="ueventd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1309, name="logd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1310, name="servicemanager", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1311, name="hwservicemanager", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1312, name="vndservicemanager", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1313, name="android.hardware.keymaster@3.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1314, name="vold", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1363, name="android.hidl.allocator@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1364, name="healthd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1365, name="android.hardware.audio@2.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1366, name="android.hardware.broadcastradio@1.1-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1367, name="android.hardware.camera.provider@2.4-service_64", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1368, name="android.hardware.configstore@1.1-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1369, name="android.hardware.drm@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1370, name="android.hardware.drm@1.1-service.clearkey", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1371, name="android.hardware.drm@1.1-service.widevine", parameters={})
    2024-02-10 12:27:33 PM - Helpers.Scanner - 82 - INFO - Running libwvhidl.so at 0x75e540a000
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1372, name="android.hardware.gatekeeper@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1373, name="android.hardware.gnss@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1374, name="android.hardware.graphics.allocator@2.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1376, name="android.hardware.health@2.0-service.goldfish", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1377, name="android.hardware.power@1.1-service.ranchu", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1378, name="android.hardware.sensors@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1379, name="android.hardware.wifi@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1380, name="hardware.google.media.c2@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1382, name="qemu-props", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1383, name="audioserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1384, name="lmkd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1386, name="thermalserviced", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1387, name="logcat", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1389, name="adbd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1390, name="traced", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1391, name="traced_probes", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1404, name="mdnsd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1532, name="surfaceflinger", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1533, name="zygote64", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1534, name="cameraserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1535, name="drmserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1536, name="incidentd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1537, name="installd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1538, name="keystore", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1539, name="mediadrmserver", parameters={})
    2024-02-10 12:27:33 PM - Helpers.Scanner - 82 - INFO - Running libmediadrm.so at 0x7bebd9b000
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1540, name="media.extractor", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1541, name="media.metrics", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1542, name="mediaserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1543, name="netd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1544, name="statsd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1545, name="storaged", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1546, name="wificond", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1547, name="media.codec", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1548, name="rild", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1550, name="gatekeeperd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1551, name="perfprofd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1552, name="tombstoned", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1562, name="android.hardware.biometrics.fingerprint@2.1-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1570, name="android.hardware.graphics.composer@2.1-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1603, name="iptables-restore", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1604, name="ip6tables-restore", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1629, name="createns", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1643, name="netmgr", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1668, name="dhcpclient", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1681, name="ipv6proxy", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1684, name="hostapd_nohidl", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1686, name="dhcpserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1692, name="system_server", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1824, name="com.google.android.inputmethod.latin", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1835, name="com.android.systemui", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1856, name="webview_zygote", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1913, name="com.android.phone", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1980, name="com.google.android.ext.services", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2061, name="wpa_supplicant", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2148, name="com.google.android.gms.persistent", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2192, name="Phone", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2337, name="com.google.android.gms", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2367, name="com.google.process.gservices", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2387, name="Google", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2421, name="com.android.se", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2485, name="com.android.smspush", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2501, name="com.android.launcher3", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2525, name="com.google.android.setupwizard", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2634, name="Photos", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2699, name="com.google.android.googlequicksearchbox:search", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2746, name="com.google.process.gapps", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2933, name="com.android.providers.calendar", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3024, name="Maps", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3088, name="Messages", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3118, name="com.google.android.gms:car", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3241, name="Calendar", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3325, name="Gmail", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3394, name="com.google.android.ims", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3610, name="com.google.android.gms.unstable", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3949, name="com.android.cellbroadcastreceiver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4033, name="com.android.keychain", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4068, name="android.process.acore", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4203, name="sh", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4205, name="sh", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4213, name="frida-server-16.1.11-android-arm64", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4215, name="logcat", parameters={})
    2024-02-10 12:27:33 PM - root - 25 - INFO - Hooks completed
    After I browse the website: https://bitmovin.com/demos/drm

    Code:
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_Keybox"
        }
    }
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCrypto_GetKeyData",
        "payload": {
            "Status": "OEMCrypto_SUCCESS",
            "Size": 72,
            "Device_Token": "0000000200001c732429b28b8fa045c0cd5f28e2113f97fd5e8582ced15414e7749d8c68dfa91ea385df0c97f3773c910c328f3c22b31e8ee0ddf3bd988b6b8b8a5f4b9a480c036f"
        }
    }
    2024-02-10 12:37:59 PM - Helpers.Scanner - 63 - DEBUG - processing device token
    2024-02-10 12:37:59 PM - Helpers.Scanner - 174 - INFO - saving key box
    2024-02-10 12:37:59 PM - Helpers.Scanner - 177 - DEBUG - saving to key_dumps/Android Emulator 5554/key_boxes/7283
    2024-02-10 12:37:59 PM - Helpers.Scanner - 184 - INFO - saved keybox to key_dumps/Android Emulator 5554/key_boxes/7283
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 13
        }
    }
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMSecurityLevel",
        "payload": {
            "Level": "L3"
        }
    }
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMSecurityLevel",
        "payload": {
            "Level": "L3"
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_Keybox"
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCrypto_GetKeyData",
        "payload": {
            "Status": "OEMCrypto_SUCCESS",
            "Size": 72,
            "Device_Token": "0000000200001c732429b28b8fa045c0cd5f28e2113f97fd5e8582ced15414e7749d8c68dfa91ea385df0c97f3773c910c328f3c22b31e8ee0ddf3bd988b6b8b8a5f4b9a480c036f"
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 63 - DEBUG - processing device token
    2024-02-10 12:38:00 PM - Helpers.Scanner - 174 - INFO - saving key box
    2024-02-10 12:38:00 PM - Helpers.Scanner - 177 - DEBUG - saving to key_dumps/Android Emulator 5554/key_boxes/7283
    2024-02-10 12:38:00 PM - Helpers.Scanner - 184 - INFO - saved keybox to key_dumps/Android Emulator 5554/key_boxes/7283
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 13
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMSecurityLevel",
        "payload": {
            "Level": "L3"
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMSecurityLevel",
        "payload": {
            "Level": "L3"
        }
    }
    Quote Quote  
  27. Member
    Join Date
    Feb 2024
    Location
    Turkey
    Search Comp PM
    Originally Posted by doganjr View Post
    Originally Posted by white_snake View Post
    Originally Posted by doganjr View Post
    I followed all the steps. I browsed the webpage on emulator: https://bitmovin.com/demos/drm. I got two files: 7283.bin and 7283.json. Instead of a .bin file and .pem file. Also, videos do not showing the visuals, just audio. Am I missing something? (btw I am macOS user and I am using a arm64 emulator)
    Again, a simple forum search wouldn't hurt: https://forum.videohelp.com/threads/404219-How-To-Dump-L3-CDM-From-Android-Device-s-(O...e3#post2643969
    I believe that problem is not that related. frida can detect my device.

    Here are the logs:

    After I started the dump_keys.py

    Code:
    2024-02-10 12:27:33 PM - root - 16 - INFO - Connected to Android Emulator 5554
    2024-02-10 12:27:33 PM - root - 17 - INFO - scanning all processes for the following libraries
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1, name="init", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1086, name="init", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1087, name="init", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1088, name="ueventd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1309, name="logd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1310, name="servicemanager", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1311, name="hwservicemanager", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1312, name="vndservicemanager", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1313, name="android.hardware.keymaster@3.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1314, name="vold", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1363, name="android.hidl.allocator@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1364, name="healthd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1365, name="android.hardware.audio@2.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1366, name="android.hardware.broadcastradio@1.1-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1367, name="android.hardware.camera.provider@2.4-service_64", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1368, name="android.hardware.configstore@1.1-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1369, name="android.hardware.drm@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1370, name="android.hardware.drm@1.1-service.clearkey", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1371, name="android.hardware.drm@1.1-service.widevine", parameters={})
    2024-02-10 12:27:33 PM - Helpers.Scanner - 82 - INFO - Running libwvhidl.so at 0x75e540a000
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1372, name="android.hardware.gatekeeper@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1373, name="android.hardware.gnss@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1374, name="android.hardware.graphics.allocator@2.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1376, name="android.hardware.health@2.0-service.goldfish", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1377, name="android.hardware.power@1.1-service.ranchu", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1378, name="android.hardware.sensors@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1379, name="android.hardware.wifi@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1380, name="hardware.google.media.c2@1.0-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1382, name="qemu-props", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1383, name="audioserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1384, name="lmkd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1386, name="thermalserviced", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1387, name="logcat", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1389, name="adbd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1390, name="traced", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1391, name="traced_probes", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1404, name="mdnsd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1532, name="surfaceflinger", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1533, name="zygote64", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1534, name="cameraserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1535, name="drmserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1536, name="incidentd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1537, name="installd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1538, name="keystore", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1539, name="mediadrmserver", parameters={})
    2024-02-10 12:27:33 PM - Helpers.Scanner - 82 - INFO - Running libmediadrm.so at 0x7bebd9b000
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1540, name="media.extractor", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1541, name="media.metrics", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1542, name="mediaserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1543, name="netd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1544, name="statsd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1545, name="storaged", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1546, name="wificond", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1547, name="media.codec", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1548, name="rild", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1550, name="gatekeeperd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1551, name="perfprofd", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1552, name="tombstoned", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1562, name="android.hardware.biometrics.fingerprint@2.1-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1570, name="android.hardware.graphics.composer@2.1-service", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1603, name="iptables-restore", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1604, name="ip6tables-restore", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1629, name="createns", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1643, name="netmgr", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1668, name="dhcpclient", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1681, name="ipv6proxy", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1684, name="hostapd_nohidl", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1686, name="dhcpserver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1692, name="system_server", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1824, name="com.google.android.inputmethod.latin", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1835, name="com.android.systemui", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1856, name="webview_zygote", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1913, name="com.android.phone", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=1980, name="com.google.android.ext.services", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2061, name="wpa_supplicant", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2148, name="com.google.android.gms.persistent", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2192, name="Phone", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2337, name="com.google.android.gms", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2367, name="com.google.process.gservices", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2387, name="Google", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2421, name="com.android.se", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2485, name="com.android.smspush", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2501, name="com.android.launcher3", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2525, name="com.google.android.setupwizard", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2634, name="Photos", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2699, name="com.google.android.googlequicksearchbox:search", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2746, name="com.google.process.gapps", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=2933, name="com.android.providers.calendar", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3024, name="Maps", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3088, name="Messages", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3118, name="com.google.android.gms:car", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3241, name="Calendar", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3325, name="Gmail", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3394, name="com.google.android.ims", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3610, name="com.google.android.gms.unstable", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=3949, name="com.android.cellbroadcastreceiver", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4033, name="com.android.keychain", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4068, name="android.process.acore", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4203, name="sh", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4205, name="sh", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4213, name="frida-server-16.1.11-android-arm64", parameters={})
    2024-02-10 12:27:33 PM - root - 19 - DEBUG - Process(pid=4215, name="logcat", parameters={})
    2024-02-10 12:27:33 PM - root - 25 - INFO - Hooks completed
    After I browse the website: https://bitmovin.com/demos/drm

    Code:
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_Keybox"
        }
    }
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCrypto_GetKeyData",
        "payload": {
            "Status": "OEMCrypto_SUCCESS",
            "Size": 72,
            "Device_Token": "0000000200001c732429b28b8fa045c0cd5f28e2113f97fd5e8582ced15414e7749d8c68dfa91ea385df0c97f3773c910c328f3c22b31e8ee0ddf3bd988b6b8b8a5f4b9a480c036f"
        }
    }
    2024-02-10 12:37:59 PM - Helpers.Scanner - 63 - DEBUG - processing device token
    2024-02-10 12:37:59 PM - Helpers.Scanner - 174 - INFO - saving key box
    2024-02-10 12:37:59 PM - Helpers.Scanner - 177 - DEBUG - saving to key_dumps/Android Emulator 5554/key_boxes/7283
    2024-02-10 12:37:59 PM - Helpers.Scanner - 184 - INFO - saved keybox to key_dumps/Android Emulator 5554/key_boxes/7283
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 13
        }
    }
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMSecurityLevel",
        "payload": {
            "Level": "L3"
        }
    }
    2024-02-10 12:37:59 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMSecurityLevel",
        "payload": {
            "Level": "L3"
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_Keybox"
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCrypto_GetKeyData",
        "payload": {
            "Status": "OEMCrypto_SUCCESS",
            "Size": 72,
            "Device_Token": "0000000200001c732429b28b8fa045c0cd5f28e2113f97fd5e8582ced15414e7749d8c68dfa91ea385df0c97f3773c910c328f3c22b31e8ee0ddf3bd988b6b8b8a5f4b9a480c036f"
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 63 - DEBUG - processing device token
    2024-02-10 12:38:00 PM - Helpers.Scanner - 174 - INFO - saving key box
    2024-02-10 12:38:00 PM - Helpers.Scanner - 177 - DEBUG - saving to key_dumps/Android Emulator 5554/key_boxes/7283
    2024-02-10 12:38:00 PM - Helpers.Scanner - 184 - INFO - saved keybox to key_dumps/Android Emulator 5554/key_boxes/7283
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 13
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMSecurityLevel",
        "payload": {
            "Level": "L3"
        }
    }
    2024-02-10 12:38:00 PM - Helpers.Scanner - 75 - DEBUG - {
        "from": "android.hardware.drm@1.1-service.widevine",
        "message": "OEMSecurityLevel",
        "payload": {
            "Level": "L3"
        }
    }
    Solved the problem. And get the private keys.
    Used the following 'dumper' repo: https://github.com/Diazole/dumper rather than proposed on the post(https://github.com/wvdumper/dumper
    ). BTW: I am a macOS user. Those who have difficulties(especially macOS users) can reach me out via DM. I will be trying to help.
    Quote Quote  
  28. Hi there, folks! Anyone could potentially help me to get pair or two of those keys for a small donation? I dont have enough skills to get them, but i definitely need them.
    Quote Quote  
  29. Search, Learn, Download! Karoolus's Avatar
    Join Date
    Oct 2022
    Location
    Belgium
    Search Comp PM
    Originally Posted by vohakev691 View Post
    Hi there, folks! Anyone could potentially help me to get pair or two of those keys for a small donation? I dont have enough skills to get them, but i definitely need them.
    You can get them for free

    In case that wasn't clear enough: check my signature
    Quote Quote  



Similar Threads

Visit our sponsor! Try DVDFab and backup Blu-rays!