Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

L1 CDM #3

Closed
Zaitooo opened this issue Aug 13, 2022 · 2 comments
Closed

L1 CDM #3

Zaitooo opened this issue Aug 13, 2022 · 2 comments

Comments

@Zaitooo
Copy link

Zaitooo commented Aug 13, 2022

Salut, j'ai un samsung et j'ai l1 avec frida rooté pour extraire les clés widevine mais le problème c'est que ça marche pas jsp comment changé le .so pour le mettre en libwvhidl.so voila

@Dijitul1029
Copy link

Salut, j'ai un samsung et j'ai l1 avec frida rooté pour extraire les clés widevine mais le problème c'est que ça marche pas jsp comment changé le .so pour le mettre en libwvhidl.so voila

were you able to extract your L1 key (private key and device blob and device client id, or whatever this tool outputted) from your phone? I want to know because I have a Moro e5 play and want to extract the widevine L1 key from it

@Avalonswanderer
Copy link
Owner

Hi, in the frida script you can change the libwvdrmengine.so to your libwvhidl.so. Hovewer this script will work for L1 and L3 to inspect messages related to the CDM (device blob, client id, request/response). The content keys and any encrypted data can only be retrieved if the certificate private key / root of trust have been previously dump. You can go to https://github.com/Avalonswanderer/widevine_key_ladder for using keys to mimic the key ladder and check the Proof-Of-Concept L3 only for Root of Trust recovery here: https://github.com/Avalonswanderer/widevinel3_Android_PoC

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants