Welcome to Doom9's Forum, THE in-place to be for everyone interested in DVD conversion. Before you start posting please read the forum rules. By posting to this forum you agree to abide by the rules. |
13th January 2007, 01:54 | #622 | Link | |
Guest
Posts: n/a
|
Quote:
The only contents of the link is the text I quoted above, which are suppoed to be used in Google to find decimal numbers. |
|
13th January 2007, 02:32 | #628 | Link | |
Guest
Posts: n/a
|
Quote:
[QUOTE]Field 1: SHA1 Hash of the VTKF000.AACS file on your HDDVD disk. Next fields are pipe "|" delimited. -Movie Title -A variable number of Title key, pipe delimited You have a key number followed by the key value like: 12-08A3DC61910280F2... Key values are 128 bits long, so 16 bytes, or 32 hexadecimal characters long..[QUOTE] |
|
13th January 2007, 02:46 | #632 | Link |
Registered User
Join Date: Jan 2007
Posts: 8
|
Now after I followed that crypted scavenger hunt and got the 2nd TK, I searched for the key in WinDVD's memory...and guess what I found...
The entire Title Key table decrypted!!!! That's right....the next 16 bytes after the 2nd key is the 3rd key and so on... Enjoy! |
13th January 2007, 02:48 | #633 | Link | |
Guest
Posts: n/a
|
Quote:
I don't see this in the original TKDB.cfg file, only 4 fields: 1: hash value 2: title 3: title key number 4: title key in hex (128 bit) |
|
13th January 2007, 02:51 | #634 | Link | |
Guest
Posts: n/a
|
Quote:
|
|
13th January 2007, 02:54 | #637 | Link |
Registered User
Join Date: Jan 2007
Posts: 55
|
Alright, this is good news.
The key "EF21329F7D838D9A7056882DBF665CD5" is the 2nd key which decrypts the file UNILOGO.EVO from the movie Serenity. This is *CONFIRMED* and *WORKING*. Here are all the keys for Serenity: 1-31325529846E19E90D88F414DA7D1661 2-EF21329F7D838D9A7056882DBF665CD5 3-46BE356597AD71BFFADEDA14FE335B64 4-8906E3E8B05EEC17E594E98D42C913FE 5-0F998F1C0C7FEB30381C01F135FBE8E9 6-97895F12C018845C9CDCE95DFF4101DF 7-6C005DA9DAA97E168129753319D748A1 8-0608D2628A9FE952398B0FB432BDB6B1 9-A24471CC766C6E7F7F56DB560CCD31E5 10-6EC977757A9E8AC378CC680770874E33 11-55962EA8084BF5135CB2ED5A5E795233 Here are the keys for KingKong: 1-7D743D3C92652CC16B66D9CB87F6D132 2-70B71C6E767E213AEB7456985BAAD8A4 3-4BC362995030035312A5B6030D76C817 4-A019B5101E904A700A44F056B7EB3579 5-896AB02D3D77554EABCE3CCE931DA39D 6-BEC07637E9C4EFA1F70FED6891DB277B 7-1DC0D276F2C5B9FCFDE1414C5002BAAB 8-BC7EB577D1936818AEB9241F024DE681 To find these keys, my best advice would be to search your memory for "VPLST000.XPL" and they will be near one of the instances of it. Now we have to find the volume keys for a lot less trouble. Last edited by Janvitos; 13th January 2007 at 02:56. |
13th January 2007, 02:56 | #638 | Link |
Registered User
Join Date: Apr 2005
Posts: 18
|
Yes won't we need the first version of the decryption to use a title key? Since the newest is for volumes? And I must say very good work on finding the key.. If the table has been reveled surely the volume key is with it..
|
|
|