VideoHelp Forum



Support our site by donate $5 directly to us Thanks!!!

Try StreamFab Downloader and download streaming video from Netflix, Amazon!



+ Reply to Thread
Results 1 to 9 of 9
  1. Hello everyone, can anyone help me to find the key of AES-256 encoded pdf ? Url to the site :- https://www.trainwithshubham.com/s/preview/courses/Batch-5---DevOps---Zero-to-Hero--65...b0b4fbdf368b0e
    I have found some threads talking about key finding of the AES protected pdf, but no complete tutorial.
    Previously I have gone through the site and able to make a new python script according to the new js to download AES 128 encrypted videos, but I am struggling with pdf. So I decided to open a new thread. Can anyone help please?
    Quote Quote  
  2. Originally Posted by Sagnik View Post
    Hello everyone, can anyone help me to find the key of AES-256 encoded pdf ? Url to the site :- https://www.trainwithshubham.com/s/preview/courses/Batch-5---DevOps---Zero-to-Hero--65...b0b4fbdf368b0e
    I have found some threads talking about key finding of the AES protected pdf, but no complete tutorial.
    Previously I have gone through the site and able to make a new python script according to the new js to download AES 128 encrypted videos, but I am struggling with pdf. So I decided to open a new thread. Can anyone help please?
    https://www.transfernow.net/dl/202505207Ss6kB6K

    pass:
    Code:
    82ec6a42-5d39-42b7-bc5e-e9074fe0b5de
    Quote Quote  
  3. Originally Posted by slayer36 View Post
    https://www.transfernow.net/dl/202505207Ss6kB6K

    pass:
    Code:
    82ec6a42-5d39-42b7-bc5e-e9074fe0b5de
    Thanks. Can you tell me what you have used ? I have found a console code to get this after posting the thread. Are you using the console or any python script. ?
    Quote Quote  
  4. Originally Posted by Sagnik View Post
    Originally Posted by slayer36 View Post
    https://www.transfernow.net/dl/202505207Ss6kB6K

    pass:
    Code:
    82ec6a42-5d39-42b7-bc5e-e9074fe0b5de
    Thanks. Can you tell me what you have used ? I have found a console code to get this after posting the thread. Are you using the console or any python script. ?
    better keep hidden if using console
    Quote Quote  
  5. Originally Posted by slayer36 View Post

    better keep hidden if using console
    Ok. BTW thanks for your help
    Quote Quote  
  6. Source: https://discord.com/channels/1313636594112139345/1360702457206018232/1361283346428067993

    Code:
    from Crypto.Cipher import AES
    from Crypto.Util.Padding import unpad
    import base64
    
    def decrypt_p_value(p: str) -> str:
        try:
            # Extract IV, Key, and Ciphertext
            iv_hex = p[:32]
            key_hex = p[-32:]
            ciphertext_b64 = p[32:-32]
    
            iv = bytes.fromhex(iv_hex)
            key = bytes.fromhex(key_hex)
            ciphertext = base64.b64decode(ciphertext_b64)
    
            # Decrypt
            cipher = AES.new(key, AES.MODE_CBC, iv)
            plaintext_padded = cipher.decrypt(ciphertext)
            plaintext = unpad(plaintext_padded, AES.block_size)
    
            return plaintext.decode('utf-8')
    
        except Exception as e:
            return f"Error during decryption: {e}"
    
    
    if __name__ == "__main__":
        p_value = input("Enter the p value: ").strip()
        result = decrypt_p_value(p_value)
        print("Decrypted value of p:", result)
    Bypass HMACs, One-time-tokens and Lic.Wrapping: https://github.com/DevLARLEY/WidevineProxy2
    Quote Quote  
  7. Originally Posted by larley View Post
    Source: https://discord.com/channels/1313636594112139345/1360702457206018232/1361283346428067993

    Code:
    from Crypto.Cipher import AES
    from Crypto.Util.Padding import unpad
    import base64
    
    def decrypt_p_value(p: str) -> str:
        try:
            # Extract IV, Key, and Ciphertext
            iv_hex = p[:32]
            key_hex = p[-32:]
            ciphertext_b64 = p[32:-32]
    
            iv = bytes.fromhex(iv_hex)
            key = bytes.fromhex(key_hex)
            ciphertext = base64.b64decode(ciphertext_b64)
    
            # Decrypt
            cipher = AES.new(key, AES.MODE_CBC, iv)
            plaintext_padded = cipher.decrypt(ciphertext)
            plaintext = unpad(plaintext_padded, AES.block_size)
    
            return plaintext.decode('utf-8')
    
        except Exception as e:
            return f"Error during decryption: {e}"
    
    
    if __name__ == "__main__":
        p_value = input("Enter the p value: ").strip()
        result = decrypt_p_value(p_value)
        print("Decrypted value of p:", result)
    Oo thanks for the python script. Can you give the invite link to the discord seever ?
    Last edited by Sagnik; 20th May 2025 at 11:22.
    Quote Quote  
  8. discord.cdrm-project.com
    Bypass HMACs, One-time-tokens and Lic.Wrapping: https://github.com/DevLARLEY/WidevineProxy2
    Quote Quote  
  9. Originally Posted by larley View Post
    discord.cdrm-project.com
    Thanks
    Quote Quote  



Similar Threads

Visit our sponsor! Try DVDFab and backup Blu-rays!