Welcome to World of IPTV

With

+23k members
+11k threads
+106k posts

we are the most popular IPTV community on the web. 

IMPORTANT NOTE:
WE HAVE RECENTLY NOTICED THAT TOO MANY DOUBLE FAKE ACCOUNTS ARE CREATED IN THE PAST.
TO PREVENT THIS ISSUE THE DECISION WAS MADE THAT IN THE FUTURE A ANNUALLY FEE 20 EURO WILL BE RAISED FOR NEW MEMBERSHIPS.

Join now to the World of IPTV

Forum Rules

Before you start, check out the forum rules first

Account upgrade

Upgrade your account to get access to full features

Advertising

Would you like to place your advertisement with us ?

Resources Manager

Hundreds of IPTV scripts and apps are available for download

Tutorial All about DRM, Widevine encryption and all what you need: CDM-Tools

redhat

Administrator
Staff member
Administrator
Chief Moderator
Moderator
Joined
Jun 19, 2019
Messages
3,066
Reaction score
14,798
Points
134
Location
root[@]woi
The Scammer: Ivan Bachvarov (als SlaSerX) has shared following content on his copied WorldofIPTV community (i still laugh about it 🤣😅😂) as if he had written these articles and contents.
Here I am sharing with you guys the stuff in original, with the


Original Author Quote:


A simple guide to downloading and decrypting widevine protected content. (HBO Max, Disney+, Hulu and Udemy specific instructions included)

The CDM-Project
The CDM-Project is a collection of tools and scripts gathered from various sources over the web in one convenient place for downloading and decrypting widevine protected content.

Edit: https://cdrm-project.com/ has just been launched, it’s a leaked version of getwvkeys and functions the same.

You can view the source code / host your own instance from https://CDM-project.com/CDM-Tools/GETWVKEYS

If you haven't seen my previous posts, you can view them here and here.

To get started start with the How To: instructions, it will take you step A-Z on the basics on how everything works. Once you get that down head on over to the site specific how to's, currently there is Hulu, HBO Max, Disney+, and Udemy.

Even if it's not in the site specific list, if you follow the Obtaining PSSH guide and the knowledge gained from the how to guide on copying headers and getting the license URL, these tools can be used on numerous sites, given the correct headers and license URL.


Purpose of this project​

Hello everyone! Hope all is good. I've spent the past few months scouring pages just to try and get decryption keys for widevine content. There was no clear instructions on the internet and the instructions that are there need pieced togther for a proper result. What I've tried to do is condense these fragments down to a cohesive guide for people to follow. If you have any questions feel free to message me on here, my reddit or discord, contact information can be found on my profile.

Prerequisites​

I used all the mentioned tools on windows 10 x64

Golang

Python 3.10.5 Make sure to check "add to path" option when installing.

ADB Minimal Install Make sure to choose yes when it asks if you would like to add to path

An Android 7-12 device that is able to be rooted.

Tools used​

L3-Dumper

DumperV2

Downey

Optional​

YT-DLP

MP4Decrypt

ffMPEG

Android devices I used​

DumperV1: Truewell T95 S1 Pre-rooted, around $30 USD, multiple user success of dumping keys (myself included), good for those who don't aren't technically adept to rooting.

DumperV2: onn. Android TV 4K UHD Streaming Device Cheap and accesable but, needs magisk, frida module, and liboemcrypto disabler installed. You can find insturctions and scripts for installing magisk and rooting here, follow up until step 7 and install the frida-server and liboemcrypto modules below from the magisk app.

IF YOU DO USE YOUR OWN ANDROID DEVICE YOU MUST INSTALL MAGISK AND THE FRIDA-SERVER MODULE OR PUSH THE FRIDA SERVER ANDROID APP IF YOU DON'T NEED THE LIBOEMCRYPTO DISABLER.

AS MENTIONED IN DUMPER READMES, SOME DEVICES WILL CONTINUE TO USE L1 AFTER ROOT, IF UNSURE USE "DRM INFO", IF STILL ON L1 PLEASE INSTALL LIBOEMCRYPTO DISABLER MAGISK MODULE


Step 1: Preparing CDM​

Connect to your android device via ADB, on the T95 this is enabled by default over wifi. Other devices may vary.

To enable ADB / USB Debugging follow these steps

  1. Open your device's Settings and tap About phone or About tablet.
  2. Tap Build number repeatedly until you see a notification that reads "You are now a developer."
  3. Go back to the main System menu, then tap Developer options.
  4. Tap the toggle switch in the top-right corner to enable developer options (if it's not already enabled).
  5. Tap OK to confirm.
  6. Tap the USB debugging toggle switch.
  7. Tap OK to confirm.
  8. The next time you plug your device into a computer, you'll receive a prompt asking if you want to authorize USB debugging for that computer. Tap OK to confirm.
You may now connect to your device

adb connect <device-ip-address> or if using USB adb devices

On your device you should receive a notificatoin to accept the adb connection, checkmark trust this device and then click allow.

IF YOU HAVE MAGISK-FRIDA MODULE INSTALLED YOU MAY SKIP TO THE NEXT STEP

THIS METHOD MAY BE USED IF YOU ARE RUNNING AT AN L3 LEVEL AND HAVE ROOT ACCESS, THIS IS JUST SPECIFIC FOR THE T95S1


Let's go ahead and push frida-server to the Android device, for the T95 S1 I used Frida-Server 15.1.17 for android. Unnzip the xz file and extract Frida-Server file.

Change directory to where you extracted the file and enter the command adb push frida-server-15.1.17-android-arm /sdcard/

Once it has been pushed open up a shell with adb shell

Move the server to the tmp directory mv /sdcard/frida-server-15.1.17-android-arm /data/local/tmp/

You may get an error about chown permission, this is negligible

Login as super user and create a new environment su -

Give execute privileges to frida-server chmod +x /data/local/tmp/frida-server-15.1.17-android-arm

Start the server /data/local/tmp/frida-server-15.1.17-android-arm

When you start the server command prompt will hang, this is normal and means the program is running, do not close out and continue to step 2

Step 2: Extracting the CDM​

If you would like to check if frida-server is running connect via adb to your device in new command prompt like in step one, then use adb shell and then su and then ps | grep frida this should show you the process running, if it does not something went wrong

NOTE: MAY NOT BE APPLICABLE IF MODULE WAS INSTALLED VIA FRIDA

Download and extract L3-Dumper for android 7-9

Download and extract DumperV2 for android 10-12

Open a new command prompt as administrator and change directories to the newly extracted folder and run pip3 install -r requirements.txt and once that's finished, start the program with python dump_keys.py

Now play some widevine encrpyed content on your Android device. I suggest using https://bitmovin.com/demos/drm playing over google chrome.

Side note: on the T95 S1 I had to do these specific steps to get it to reliably dump. Play the video on bitmovin, stop dumper, start dumper, wait for it to finish booting, then click on the green "load" button in the top right of bitmovin while the video was still playing, so far this method has worked the best for me

Side note: on the onn 4k box, I had to install fx file manager and sideload launcher, push a chrome apk, install with the file manager, and run from sideloader, started on a page that wasn't bitmovin (duckduckgo.com in my case) started the script, loaded bitmovin, clicked the "load" button in the top right corner, stopped the script, started the script again, went back to duckduckgo.com, stopped the script and started repeatedly until you see an RSA fingerprint, when you see that you can go back to butmovin and play the video and dump the keys


Once you have played the content your keys should be dumped in the dumper folder under /key-dumps/your-device-keys/xxxx/xxxxxxxx/ and should be named client_id.bin and private_key.pem

Make a copy of these for safekeeping wherever you like but DO NOT LOSE THEM

You can now close out of running frida server if you are running it over adb, you may also close dumper once you have verified successful dumping.

Make sure to have file extensions visible on windows, this can be turned on by searching "show file extensions" in the windows search bar.

Now we will rename these files, clent_id.bin to device_client_id_blob. and rename private_key.pem to device_private_key.

The periods on the end is intentional as windows likes to keep file extentions, please make sure to have this exact or it will cause errors with downey! Only rename with windows, using a program such as text editor and saving under all files will still corrupt the data!

Step 3: Obtaining decryption keys​

Download and extract Downey

Open a new command prompt as administrator and change directories to the newly extracted folder

Build Downey with command go build -o downey.exe -a main.go once this is finished you should see downeye.exe in your Downey folder

Copy the device_client_id_blob file and device_private_key file to the Downey folder.

Open Firefox or Chrome and navigate back to https://bitmovin.com/demos/drm and open web devoloper tools (ctrl+shift+c) and click on the network tab

Play the video on the site, then in the filter urls type in method:pOST and under the domain look for the licensing server, in this case it's https://cwip-shaka-proxy.appspot.com/ right click on this value and copy value -> copy post data and paste this somewhere safe for now.

Next we need the MPD file, under the filter url section in the network tab now we are going to filter for MPD one result should show up for 11331.mpd downoad this by double clicking or copying and saving. Rename this file to manifest.mpdand place it in your Downey folder

Now we have everything we need, let's go ahead and run downey with downey.exe --lic-server "https://cwip-shaka-proxy.appspot.com/no_auth" if everything goes successful you should get the decryption keys for the video, so for bitmovin i received

Decryption keys:
ccbf5fb4c2965be7aa130ffb3ba9fd73:9cc0c92044cb1d69433f5f5839a159df 9bf0e9cf0d7b55aeb4b289a63bab8610:90f52fd8ca48717b21d0c2fed7a12ae1 eb676abbcb345e96bbcf616630f1a3da:100b6c20940f779a4589152b57d2dacb 0294b9599d755de2bbf0fdca3fa5eab7:3bda2f40344c7def614227b9c0f03e26 639da80cf23b55f3b8cab3f64cfa5df6:229f5f29b643e203004b30c4eaf348f4

And there you have it! decryption keys for all versions of the video and one for the audio.

Optional: How to download, decrypt, and merge Bitmovin video and audio​

Downloading​

Download YT-DLP and place in a new folder or a folder of your choice.

Open a new command prompt as administrator and change directories to the folder you've placed yt-dlp.exe

Go back to https://bitmovin.com/demos/drm and open up the web devoloper tools (ctrl+shift+c) and click on the network tab.

Play the video on the site, then in the filter urls type in MPD like in step 3.

Copy the url value from the search result. You can do this by: Right click -> Copy Value -> Copy URL In this case it should be
https://cdn.bitmovin.com/content/assets/art-of-motion_drm/mpds/11331.mpd

Now in the command prompt you have opened execute the command:
yt-dlp.exe --allow-unplayable https://cdn.bitmovin.com/content/assets/art-of-motion_drm/mpds/11331.mpd

This should download two files in your yt-dlp directory, an encrpyted mp4 video file and an encrypted m4a audio file. For ease I have renamed these encrypted.mp4 and encrypted.m4a

Decrypting​

Download and extract MP4Decrypt

Open a new command prompt as administrator and change directories to the MP4Decrypt bin folder.

Place your encrpyted.mp4 and encrypted.m4a files in this bin folder as well

Decrpyt the video by using mp4decrypt.exe --key xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx inputfile.mp4 outputfile.mp4 where the key in this case would be one we extracted earlier, inputfile.mp4 being the encrytped.mp4 file we downloaded earlier and outputfile.mp4 can be named whatever you choose, I will be using decrypted.mp4 so for this instance it would be mp4decrypt.exe --key eb676abbcb345e96bbcf616630f1a3da:100b6c20940f779a4589152b57d2dacb encrypted.mp4 decrypted.mp4

Decrpyt the audio by using mp4decrypt.exe --key xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx inputfile.m4a outputfile.m4a where the key in this case would be one we extracted earlier, inputfile.m4a being the encrytped.m4a file we downloaded earlier and outputfile.m4a can be named whatever you choose, I will be using decrypted.m4a so for this instance it would be mp4decrypt.exe --key eb676abbcb345e96bbcf616630f1a3da:100b6c20940f779a4589152b57d2dacb encrypted.m4a decrypted.m4a

You should now have two playable files, the video decrypted.mp4 and the audio decrypted.m4a now it's time for the final step .

Merging​

Download and extract ffMPEG

Open a new command prompt as administrator and change directories to the ffmpeg bin folder.

Place your decrpyted.mp4 and derypted.m4a files in this bin folder as well

In command prompt issue the command to merge the two streams ffmpeg.exe -i decrypted.mp4 -i decrypted.m4a -vcodec copy -acodec copy bitmovin.mp4

Congrats, you now have a playable widevine audio/video file!

Site Specific instructions.​

Hopefully more to come!

HBO Max

Udemy

Hulu

Disney+
 
Last edited:

nallrad

Basic Member
Basic Member
Joined
Jan 23, 2021
Messages
2
Reaction score
0
Points
1
Location
Brazil
The Scammer: Ivan Bachvarov (als SlaSerX) has shared following content on his copied WorldofIPTV community (i still laugh about it 🤣😅😂) as if he had written these articles and contents.
Here I am sharing with you guys the stuff in original, with the


Original Author Quote:


A simple guide to downloading and decrypting widevine protected content. (HBO Max, Disney+, Hulu and Udemy specific instructions included)

The CDM-Project
The CDM-Project is a collection of tools and scripts gathered from various sources over the web in one convenient place for downloading and decrypting widevine protected content.

Edit: https://cdrm-project.com/ has just been launched, it’s a leaked version of getwvkeys and functions the same.

You can view the source code / host your own instance from https://CDM-project.com/CDM-Tools/GETWVKEYS

If you haven't seen my previous posts, you can view them here and here.

To get started start with the How To: instructions, it will take you step A-Z on the basics on how everything works. Once you get that down head on over to the site specific how to's, currently there is Hulu, HBO Max, Disney+, and Udemy.

Even if it's not in the site specific list, if you follow the Obtaining PSSH guide and the knowledge gained from the how to guide on copying headers and getting the license URL, these tools can be used on numerous sites, given the correct headers and license URL.


Purpose of this project​

Hello everyone! Hope all is good. I've spent the past few months scouring pages just to try and get decryption keys for widevine content. There was no clear instructions on the internet and the instructions that are there need pieced togther for a proper result. What I've tried to do is condense these fragments down to a cohesive guide for people to follow. If you have any questions feel free to message me on here, my reddit or discord, contact information can be found on my profile.

Prerequisites​

I used all the mentioned tools on windows 10 x64

Golang

Python 3.10.5 Make sure to check "add to path" option when installing.

ADB Minimal Install Make sure to choose yes when it asks if you would like to add to path

An Android 7-12 device that is able to be rooted.

Tools used​

L3-Dumper

DumperV2

Downey

Optional​

YT-DLP

MP4Decrypt

ffMPEG

Android devices I used​

DumperV1: Truewell T95 S1 Pre-rooted, around $30 USD, multiple user success of dumping keys (myself included), good for those who don't aren't technically adept to rooting.

DumperV2: onn. Android TV 4K UHD Streaming Device Cheap and accesable but, needs magisk, frida module, and liboemcrypto disabler installed. You can find insturctions and scripts for installing magisk and rooting here, follow up until step 7 and install the frida-server and liboemcrypto modules below from the magisk app.

IF YOU DO USE YOUR OWN ANDROID DEVICE YOU MUST INSTALL MAGISK AND THE FRIDA-SERVER MODULE OR PUSH THE FRIDA SERVER ANDROID APP IF YOU DON'T NEED THE LIBOEMCRYPTO DISABLER.

AS MENTIONED IN DUMPER READMES, SOME DEVICES WILL CONTINUE TO USE L1 AFTER ROOT, IF UNSURE USE "DRM INFO", IF STILL ON L1 PLEASE INSTALL LIBOEMCRYPTO DISABLER MAGISK MODULE


Step 1: Preparing CDM​

Connect to your android device via ADB, on the T95 this is enabled by default over wifi. Other devices may vary.

To enable ADB / USB Debugging follow these steps

  1. Open your device's Settings and tap About phone or About tablet.
  2. Tap Build number repeatedly until you see a notification that reads "You are now a developer."
  3. Go back to the main System menu, then tap Developer options.
  4. Tap the toggle switch in the top-right corner to enable developer options (if it's not already enabled).
  5. Tap OK to confirm.
  6. Tap the USB debugging toggle switch.
  7. Tap OK to confirm.
  8. The next time you plug your device into a computer, you'll receive a prompt asking if you want to authorize USB debugging for that computer. Tap OK to confirm.
You may now connect to your device

adb connect <device-ip-address> or if using USB adb devices

On your device you should receive a notificatoin to accept the adb connection, checkmark trust this device and then click allow.

IF YOU HAVE MAGISK-FRIDA MODULE INSTALLED YOU MAY SKIP TO THE NEXT STEP

THIS METHOD MAY BE USED IF YOU ARE RUNNING AT AN L3 LEVEL AND HAVE ROOT ACCESS, THIS IS JUST SPECIFIC FOR THE T95S1


Let's go ahead and push frida-server to the Android device, for the T95 S1 I used Frida-Server 15.1.17 for android. Unnzip the xz file and extract Frida-Server file.

Change directory to where you extracted the file and enter the command adb push frida-server-15.1.17-android-arm /sdcard/

Once it has been pushed open up a shell with adb shell

Move the server to the tmp directory mv /sdcard/frida-server-15.1.17-android-arm /data/local/tmp/

You may get an error about chown permission, this is negligible

Login as super user and create a new environment su -

Give execute privileges to frida-server chmod +x /data/local/tmp/frida-server-15.1.17-android-arm

Start the server /data/local/tmp/frida-server-15.1.17-android-arm

When you start the server command prompt will hang, this is normal and means the program is running, do not close out and continue to step 2

Step 2: Extracting the CDM​

If you would like to check if frida-server is running connect via adb to your device in new command prompt like in step one, then use adb shell and then su and then ps | grep frida this should show you the process running, if it does not something went wrong

NOTE: MAY NOT BE APPLICABLE IF MODULE WAS INSTALLED VIA FRIDA

Download and extract L3-Dumper for android 7-9

Download and extract DumperV2 for android 10-12

Open a new command prompt as administrator and change directories to the newly extracted folder and run pip3 install -r requirements.txt and once that's finished, start the program with python dump_keys.py

Now play some widevine encrpyed content on your Android device. I suggest using https://bitmovin.com/demos/drm playing over google chrome.

Side note: on the T95 S1 I had to do these specific steps to get it to reliably dump. Play the video on bitmovin, stop dumper, start dumper, wait for it to finish booting, then click on the green "load" button in the top right of bitmovin while the video was still playing, so far this method has worked the best for me

Side note: on the onn 4k box, I had to install fx file manager and sideload launcher, push a chrome apk, install with the file manager, and run from sideloader, started on a page that wasn't bitmovin (duckduckgo.com in my case) started the script, loaded bitmovin, clicked the "load" button in the top right corner, stopped the script, started the script again, went back to duckduckgo.com, stopped the script and started repeatedly until you see an RSA fingerprint, when you see that you can go back to butmovin and play the video and dump the keys


Once you have played the content your keys should be dumped in the dumper folder under /key-dumps/your-device-keys/xxxx/xxxxxxxx/ and should be named client_id.bin and private_key.pem

Make a copy of these for safekeeping wherever you like but DO NOT LOSE THEM

You can now close out of running frida server if you are running it over adb, you may also close dumper once you have verified successful dumping.

Make sure to have file extensions visible on windows, this can be turned on by searching "show file extensions" in the windows search bar.

Now we will rename these files, clent_id.bin to device_client_id_blob. and rename private_key.pem to device_private_key.

The periods on the end is intentional as windows likes to keep file extentions, please make sure to have this exact or it will cause errors with downey! Only rename with windows, using a program such as text editor and saving under all files will still corrupt the data!

Step 3: Obtaining decryption keys​

Download and extract Downey

Open a new command prompt as administrator and change directories to the newly extracted folder

Build Downey with command go build -o downey.exe -a main.go once this is finished you should see downeye.exe in your Downey folder

Copy the device_client_id_blob file and device_private_key file to the Downey folder.

Open Firefox or Chrome and navigate back to https://bitmovin.com/demos/drm and open web devoloper tools (ctrl+shift+c) and click on the network tab

Play the video on the site, then in the filter urls type in method:pOST and under the domain look for the licensing server, in this case it's https://cwip-shaka-proxy.appspot.com/ right click on this value and copy value -> copy post data and paste this somewhere safe for now.

Next we need the MPD file, under the filter url section in the network tab now we are going to filter for MPD one result should show up for 11331.mpd downoad this by double clicking or copying and saving. Rename this file to manifest.mpdand place it in your Downey folder

Now we have everything we need, let's go ahead and run downey with downey.exe --lic-server "https://cwip-shaka-proxy.appspot.com/no_auth" if everything goes successful you should get the decryption keys for the video, so for bitmovin i received

Decryption keys:
ccbf5fb4c2965be7aa130ffb3ba9fd73:9cc0c92044cb1d69433f5f5839a159df 9bf0e9cf0d7b55aeb4b289a63bab8610:90f52fd8ca48717b21d0c2fed7a12ae1 eb676abbcb345e96bbcf616630f1a3da:100b6c20940f779a4589152b57d2dacb 0294b9599d755de2bbf0fdca3fa5eab7:3bda2f40344c7def614227b9c0f03e26 639da80cf23b55f3b8cab3f64cfa5df6:229f5f29b643e203004b30c4eaf348f4

And there you have it! decryption keys for all versions of the video and one for the audio.

Optional: How to download, decrypt, and merge Bitmovin video and audio​

Downloading​

Download YT-DLP and place in a new folder or a folder of your choice.

Open a new command prompt as administrator and change directories to the folder you've placed yt-dlp.exe

Go back to https://bitmovin.com/demos/drm and open up the web devoloper tools (ctrl+shift+c) and click on the network tab.

Play the video on the site, then in the filter urls type in MPD like in step 3.

Copy the url value from the search result. You can do this by: Right click -> Copy Value -> Copy URL In this case it should be
https://cdn.bitmovin.com/content/assets/art-of-motion_drm/mpds/11331.mpd

Now in the command prompt you have opened execute the command:
yt-dlp.exe --allow-unplayable https://cdn.bitmovin.com/content/assets/art-of-motion_drm/mpds/11331.mpd

This should download two files in your yt-dlp directory, an encrpyted mp4 video file and an encrypted m4a audio file. For ease I have renamed these encrypted.mp4 and encrypted.m4a

Decrypting​

Download and extract MP4Decrypt

Open a new command prompt as administrator and change directories to the MP4Decrypt bin folder.

Place your encrpyted.mp4 and encrypted.m4a files in this bin folder as well

Decrpyt the video by using mp4decrypt.exe --key xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx inputfile.mp4 outputfile.mp4 where the key in this case would be one we extracted earlier, inputfile.mp4 being the encrytped.mp4 file we downloaded earlier and outputfile.mp4 can be named whatever you choose, I will be using decrypted.mp4 so for this instance it would be mp4decrypt.exe --key eb676abbcb345e96bbcf616630f1a3da:100b6c20940f779a4589152b57d2dacb encrypted.mp4 decrypted.mp4

Decrpy o áudio usando mp4decrypt.exe --key xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx inputfile.m4a outputfile.m4a onde a chave neste caso seria uma que extraímos anteriormente, inputfile.m4a sendo o arquivo encriptado.m4a que baixado anteriormente e outputfile.m4a pode ter o nome que você escolher, usarei descriptografado.m4a, portanto, para esta instância, seria mp4decrypt.exe --chave eb676abbcb345e96bbcf616630f1a3da:100b6c20940f779a4589152b57d2dacb criptografado.m4a descriptografado.m4a[/ICO DE] Agora você deve ter dois arquivos reproduzíveis, o vídeo descriptografado.mp4 e o áudio descriptografado.m4a agora é hora da etapa final . [HEADING=3]Mesclando[/HEADING] Baixe e extraia [URL='https://www.gyan.dev/ffmpeg/builds/ffmpeg-release-full.7z'][COLOR=rgb(243, 121, 52)]o ffMPEG[/COLOR][/URL] Abra um novo prompt de comando como administrador e altere os diretórios para a pasta ffmpeg bin. Coloque seus arquivos decrpyted.mp4 e derypted.m4a nesta pasta bin também No prompt de comando, emita o comando para mesclar os dois fluxos [ICODE]ffmpeg.exe -i decrypted.mp4 -i decrypted.m4a -vcodec copy -acodec copy bitmovin.mp4

Parabéns, agora você tem um arquivo de áudio/vídeo widevine reproduzível!

Instruções específicas do local.​

Esperemos que mais para vir!

HBO Max

Udemy

Hulu

Disney+
nice, thank :)
 

fedexxx

Basic Member
Basic Member
Ext. Member
Joined
Jun 24, 2023
Messages
2
Reaction score
0
Points
1
Location
Italy
Thank you for this tutorial. I'm new and I this was very helpful
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

eldondee

Basic Member
Basic Member
Ext. Member
Joined
Jul 2, 2023
Messages
3
Reaction score
0
Points
1
Location
38Levans
The Scammer: Ivan Bachvarov (als SlaSerX) has shared following content on his copied WorldofIPTV community (i still laugh about it 🤣😅😂) as if he had written these articles and contents.
Here I am sharing with you guys the stuff in original, with the


Original Author Quote:


A simple guide to downloading and decrypting widevine protected content. (HBO Max, Disney+, Hulu and Udemy specific instructions included)

The CDM-Project
The CDM-Project is a collection of tools and scripts gathered from various sources over the web in one convenient place for downloading and decrypting widevine protected content.

Edit: https://cdrm-project.com/ has just been launched, it’s a leaked version of getwvkeys and functions the same.

You can view the source code / host your own instance from https://CDM-project.com/CDM-Tools/GETWVKEYS

If you haven't seen my previous posts, you can view them here and here.

To get started start with the How To: instructions, it will take you step A-Z on the basics on how everything works. Once you get that down head on over to the site specific how to's, currently there is Hulu, HBO Max, Disney+, and Udemy.

Even if it's not in the site specific list, if you follow the Obtaining PSSH guide and the knowledge gained from the how to guide on copying headers and getting the license URL, these tools can be used on numerous sites, given the correct headers and license URL.


Purpose of this project​

Hello everyone! Hope all is good. I've spent the past few months scouring pages just to try and get decryption keys for widevine content. There was no clear instructions on the internet and the instructions that are there need pieced togther for a proper result. What I've tried to do is condense these fragments down to a cohesive guide for people to follow. If you have any questions feel free to message me on here, my reddit or discord, contact information can be found on my profile.

Prerequisites​

I used all the mentioned tools on windows 10 x64

Golang

Python 3.10.5 Make sure to check "add to path" option when installing.

ADB Minimal Install Make sure to choose yes when it asks if you would like to add to path

An Android 7-12 device that is able to be rooted.

Tools used​

L3-Dumper

DumperV2

Downey

Optional​

YT-DLP

MP4Decrypt

ffMPEG

Android devices I used​

DumperV1: Truewell T95 S1 Pre-rooted, around $30 USD, multiple user success of dumping keys (myself included), good for those who don't aren't technically adept to rooting.

DumperV2: onn. Android TV 4K UHD Streaming Device Cheap and accesable but, needs magisk, frida module, and liboemcrypto disabler installed. You can find insturctions and scripts for installing magisk and rooting here, follow up until step 7 and install the frida-server and liboemcrypto modules below from the magisk app.

IF YOU DO USE YOUR OWN ANDROID DEVICE YOU MUST INSTALL MAGISK AND THE FRIDA-SERVER MODULE OR PUSH THE FRIDA SERVER ANDROID APP IF YOU DON'T NEED THE LIBOEMCRYPTO DISABLER.

AS MENTIONED IN DUMPER READMES, SOME DEVICES WILL CONTINUE TO USE L1 AFTER ROOT, IF UNSURE USE "DRM INFO", IF STILL ON L1 PLEASE INSTALL LIBOEMCRYPTO DISABLER MAGISK MODULE


Step 1: Preparing CDM​

Connect to your android device via ADB, on the T95 this is enabled by default over wifi. Other devices may vary.

To enable ADB / USB Debugging follow these steps

  1. Open your device's Settings and tap About phone or About tablet.
  2. Tap Build number repeatedly until you see a notification that reads "You are now a developer."
  3. Go back to the main System menu, then tap Developer options.
  4. Tap the toggle switch in the top-right corner to enable developer options (if it's not already enabled).
  5. Tap OK to confirm.
  6. Tap the USB debugging toggle switch.
  7. Tap OK to confirm.
  8. The next time you plug your device into a computer, you'll receive a prompt asking if you want to authorize USB debugging for that computer. Tap OK to confirm.
You may now connect to your device

adb connect <device-ip-address> or if using USB adb devices

On your device you should receive a notificatoin to accept the adb connection, checkmark trust this device and then click allow.

IF YOU HAVE MAGISK-FRIDA MODULE INSTALLED YOU MAY SKIP TO THE NEXT STEP

THIS METHOD MAY BE USED IF YOU ARE RUNNING AT AN L3 LEVEL AND HAVE ROOT ACCESS, THIS IS JUST SPECIFIC FOR THE T95S1


Let's go ahead and push frida-server to the Android device, for the T95 S1 I used Frida-Server 15.1.17 for android. Unnzip the xz file and extract Frida-Server file.

Change directory to where you extracted the file and enter the command adb push frida-server-15.1.17-android-arm /sdcard/

Once it has been pushed open up a shell with adb shell

Move the server to the tmp directory mv /sdcard/frida-server-15.1.17-android-arm /data/local/tmp/

You may get an error about chown permission, this is negligible

Login as super user and create a new environment su -

Give execute privileges to frida-server chmod +x /data/local/tmp/frida-server-15.1.17-android-arm

Start the server /data/local/tmp/frida-server-15.1.17-android-arm

When you start the server command prompt will hang, this is normal and means the program is running, do not close out and continue to step 2

Step 2: Extracting the CDM​

If you would like to check if frida-server is running connect via adb to your device in new command prompt like in step one, then use adb shell and then su and then ps | grep frida this should show you the process running, if it does not something went wrong

NOTE: MAY NOT BE APPLICABLE IF MODULE WAS INSTALLED VIA FRIDA

Download and extract L3-Dumper for android 7-9

Download and extract DumperV2 for android 10-12

Open a new command prompt as administrator and change directories to the newly extracted folder and run pip3 install -r requirements.txt and once that's finished, start the program with python dump_keys.py

Now play some widevine encrpyed content on your Android device. I suggest using https://bitmovin.com/demos/drm playing over google chrome.

Side note: on the T95 S1 I had to do these specific steps to get it to reliably dump. Play the video on bitmovin, stop dumper, start dumper, wait for it to finish booting, then click on the green "load" button in the top right of bitmovin while the video was still playing, so far this method has worked the best for me

Side note: on the onn 4k box, I had to install fx file manager and sideload launcher, push a chrome apk, install with the file manager, and run from sideloader, started on a page that wasn't bitmovin (duckduckgo.com in my case) started the script, loaded bitmovin, clicked the "load" button in the top right corner, stopped the script, started the script again, went back to duckduckgo.com, stopped the script and started repeatedly until you see an RSA fingerprint, when you see that you can go back to butmovin and play the video and dump the keys


Once you have played the content your keys should be dumped in the dumper folder under /key-dumps/your-device-keys/xxxx/xxxxxxxx/ and should be named client_id.bin and private_key.pem

Make a copy of these for safekeeping wherever you like but DO NOT LOSE THEM

You can now close out of running frida server if you are running it over adb, you may also close dumper once you have verified successful dumping.

Make sure to have file extensions visible on windows, this can be turned on by searching "show file extensions" in the windows search bar.

Now we will rename these files, clent_id.bin to device_client_id_blob. and rename private_key.pem to device_private_key.

The periods on the end is intentional as windows likes to keep file extentions, please make sure to have this exact or it will cause errors with downey! Only rename with windows, using a program such as text editor and saving under all files will still corrupt the data!

Step 3: Obtaining decryption keys​

Download and extract Downey

Open a new command prompt as administrator and change directories to the newly extracted folder

Build Downey with command go build -o downey.exe -a main.go once this is finished you should see downeye.exe in your Downey folder

Copy the device_client_id_blob file and device_private_key file to the Downey folder.

Open Firefox or Chrome and navigate back to https://bitmovin.com/demos/drm and open web devoloper tools (ctrl+shift+c) and click on the network tab

Play the video on the site, then in the filter urls type in method:pOST and under the domain look for the licensing server, in this case it's https://cwip-shaka-proxy.appspot.com/ right click on this value and copy value -> copy post data and paste this somewhere safe for now.

Next we need the MPD file, under the filter url section in the network tab now we are going to filter for MPD one result should show up for 11331.mpd downoad this by double clicking or copying and saving. Rename this file to manifest.mpdand place it in your Downey folder

Now we have everything we need, let's go ahead and run downey with downey.exe --lic-server "https://cwip-shaka-proxy.appspot.com/no_auth" if everything goes successful you should get the decryption keys for the video, so for bitmovin i received

Decryption keys:
ccbf5fb4c2965be7aa130ffb3ba9fd73:9cc0c92044cb1d69433f5f5839a159df 9bf0e9cf0d7b55aeb4b289a63bab8610:90f52fd8ca48717b21d0c2fed7a12ae1 eb676abbcb345e96bbcf616630f1a3da:100b6c20940f779a4589152b57d2dacb 0294b9599d755de2bbf0fdca3fa5eab7:3bda2f40344c7def614227b9c0f03e26 639da80cf23b55f3b8cab3f64cfa5df6:229f5f29b643e203004b30c4eaf348f4

And there you have it! decryption keys for all versions of the video and one for the audio.

Optional: How to download, decrypt, and merge Bitmovin video and audio​

Downloading​

Download YT-DLP and place in a new folder or a folder of your choice.

Open a new command prompt as administrator and change directories to the folder you've placed yt-dlp.exe

Go back to https://bitmovin.com/demos/drm and open up the web devoloper tools (ctrl+shift+c) and click on the network tab.

Play the video on the site, then in the filter urls type in MPD like in step 3.

Copy the url value from the search result. You can do this by: Right click -> Copy Value -> Copy URL In this case it should be
https://cdn.bitmovin.com/content/assets/art-of-motion_drm/mpds/11331.mpd

Now in the command prompt you have opened execute the command:
yt-dlp.exe --allow-unplayable https://cdn.bitmovin.com/content/assets/art-of-motion_drm/mpds/11331.mpd

This should download two files in your yt-dlp directory, an encrpyted mp4 video file and an encrypted m4a audio file. For ease I have renamed these encrypted.mp4 and encrypted.m4a

Decrypting​

Download and extract MP4Decrypt

Open a new command prompt as administrator and change directories to the MP4Decrypt bin folder.

Place your encrpyted.mp4 and encrypted.m4a files in this bin folder as well

Decrpyt the video by using mp4decrypt.exe --key xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx inputfile.mp4 outputfile.mp4 where the key in this case would be one we extracted earlier, inputfile.mp4 being the encrytped.mp4 file we downloaded earlier and outputfile.mp4 can be named whatever you choose, I will be using decrypted.mp4 so for this instance it would be mp4decrypt.exe --key eb676abbcb345e96bbcf616630f1a3da:100b6c20940f779a4589152b57d2dacb encrypted.mp4 decrypted.mp4

Decrpyt the audio by using mp4decrypt.exe --key xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx inputfile.m4a outputfile.m4a where the key in this case would be one we extracted earlier, inputfile.m4a being the encrytped.m4a file we downloaded earlier and outputfile.m4a can be named whatever you choose, I will be using decrypted.m4a so for this instance it would be mp4decrypt.exe --key eb676abbcb345e96bbcf616630f1a3da:100b6c20940f779a4589152b57d2dacb encrypted.m4a decrypted.m4a

You should now have two playable files, the video decrypted.mp4 and the audio decrypted.m4a now it's time for the final step .

Merging​

Download and extract ffMPEG

Open a new command prompt as administrator and change directories to the ffmpeg bin folder.

Place your decrpyted.mp4 and derypted.m4a files in this bin folder as well

In command prompt issue the command to merge the two streams ffmpeg.exe -i decrypted.mp4 -i decrypted.m4a -vcodec copy -acodec copy bitmovin.mp4

Congrats, you now have a playable widevine audio/video file!

Site Specific instructions.​

Hopefully more to come!

HBO Max

Udemy

Hulu

Disney+
Finally this was what I came here for
 

Cevex

Basic Member
Basic Member
Joined
Aug 14, 2021
Messages
1
Reaction score
0
Points
1
Location
Usa
Very well written and helpful. Thanks much!
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com
shape1
shape2
shape3
shape4
shape5
shape6
Top
AdBlock Detected

We know, ad-blocking software do a great job at blocking ads. But our site is sponsored by advertising. 

For the best possible site experience please take a moment to disable your AdBlocker.
You can create a Account with us or if you already have account, you can prefer an Account Upgrade.

I've Disabled AdBlock