VideoHelp Forum




+ Reply to Thread
Results 1 to 10 of 10
  1. hello, i get this info from VideoDownload Helper (ext for chrome)

    Code:
    url: https://b42564.2.cdn.telefonica.com/_42564/_-_d3v6nuLm9K-a6ta4oia6CTC1FfpExGx1pv-SUFGdcugM-bJpbVeODB2NWNz3lKNZ_-_/live/disk1/DiscoveryTurbo/_shared_047be05ff7246ecca89a94b4e2da1cb1/DiscoveryTurbo-avc1_500000=5-scale=30000-6919718003801.mp4
    
    urlFilename: DiscoveryTurbo-avc1_500000=5-scale=30000-6919718003801
    from this url
    Code:
    https://iterltaniciate.blog/embed/mplay/discovery_turbo-pe.html
    , i can't fin how to get the m3u8, the url is extra-large and im complete ignorant how to do.
    Quote Quote  
  2. Hmm, can anyone find the license server for this?
    There's nothing with Fiddler or HTTP Debugger, (probably) nothing in deobfuscated javascript of page source...
    click click2
    If I/my posts ever helped you, and you want to give back, send me a private message!
    Quote Quote  
  3. The browser does not apply to the license server. Apparently the 'key' is recorded in 'JS'.
    Quote Quote  
  4. i get this from cheking with opera console

    blob:https://iterltaniciate.blog/7df8731a-427d-4667-ad4e-9e34e88430b1
    Quote Quote  
  5. Originally Posted by LZAA View Post
    The browser does not apply to the license server. Apparently the 'key' is recorded in 'JS'.
    Interesting. Thanks.
    click click2
    If I/my posts ever helped you, and you want to give back, send me a private message!
    Quote Quote  
  6. mpd not m3u8

    download
    Code:
    yt-dlp --allow-u https://b42564.2.cdn.telefonica.com/_42564/_-_d3v6nuLm9K-a6ta4oia6CTC1FfpExGx1pv-SUFGdcugM-bJpbVeODB2NWNz3lKNZ_-_/live/disk1/DiscoveryTurbo/DISCOVERYTURBO_CN_DASH_HD/DiscoveryTurbo.mpd
    decryption kid:key (you can find it in the console tab in the clearkey section encoded in base64
    Code:
    1d33f61c1654494e9cf6aa28217f0949:f22ef6012573a0a2db42854bd79495e3
    Quote Quote  
  7. Originally Posted by ElCap View Post
    mpd not m3u8

    download
    Code:
    yt-dlp --allow-u https://b42564.2.cdn.telefonica.com/_42564/_-_d3v6nuLm9K-a6ta4oia6CTC1FfpExGx1pv-SUFGdcugM-bJpbVeODB2NWNz3lKNZ_-_/live/disk1/DiscoveryTurbo/DISCOVERYTURBO_CN_DASH_HD/DiscoveryTurbo.mpd
    decryption kid:key (you can find it in the console tab in the clearkey section encoded in base64
    Code:
    1d33f61c1654494e9cf6aa28217f0949:f22ef6012573a0a2db42854bd79495e3


    can you please show some pics on how to get the keys?
    Quote Quote  
  8. Originally Posted by PUOPUO View Post
    can you please show some pics on how to get the keys?
    with emelogger installed you should see this in the console tab
    Image
    [Attachment 64518 - Click to enlarge]


    base64 decode this value to text
    Code:
    eyJrZXlzIjpbeyJrdHkiOiJvY3QiLCJraWQiOiJIVFAySEJaVVNVNmM5cW9vSVg4SlNRIiwiayI6IjhpNzJBU1Z6b0tMYlFvVkwxNVNWNHcifV19
    decoded:
    Code:
    {"keys":[{"kty":"oct","kid":"HTP2HBZUSU6c9qooIX8JSQ","k":"8i72ASVzoKLbQoVL15SV4w"}]}
    convert the kid from base64 to hex
    convert the k(ey) from base64 to hex
    Quote Quote  
  9. Made a script based on the above posts to automate things..
    Code:
    import base64
    import json
    
    clearkey_b64 = input('\nEnter the clearkey in base64 format : ')
    b64_to_text = base64.b64decode(clearkey_b64).decode()
    jsn = json.loads(b64_to_text)
    kid_str = jsn['keys'][0]['kid']
    key_str = jsn['keys'][0]['k']
    kid_str_sanitized = kid_str.replace('-','+').replace('_','/')
    key_str_sanitized = key_str.replace('-','+').replace('_','/')
    kid = base64.b64decode(kid_str_sanitized + '==').hex()
    key = base64.b64decode(key_str_sanitized + '==').hex()   
    print(f'--key {kid}:{key}')
    Quote Quote  
  10. Member
    Join Date
    Apr 2023
    Location
    Shanghai
    Search Comp PM
    Originally Posted by pkp View Post
    Made a script based on the above posts to automate things..
    Code:
    import base64
    import json
    
    clearkey_b64 = input('\nEnter the clearkey in base64 format : ')
    b64_to_text = base64.b64decode(clearkey_b64).decode()
    jsn = json.loads(b64_to_text)
    kid_str = jsn['keys'][0]['kid']
    key_str = jsn['keys'][0]['k']
    kid_str_sanitized = kid_str.replace('-','+').replace('_','/')
    key_str_sanitized = key_str.replace('-','+').replace('_','/')
    kid = base64.b64decode(kid_str_sanitized + '==').hex()
    key = base64.b64decode(key_str_sanitized + '==').hex()   
    print(f'--key {kid}:{key}')
    Useful. thanks
    Quote Quote  



Similar Threads

Visit our sponsor! Try DVDFab and backup Blu-rays!