Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

I only get license_request.bin #52

Open
target1plus opened this issue Sep 13, 2022 · 11 comments
Open

I only get license_request.bin #52

target1plus opened this issue Sep 13, 2022 · 11 comments

Comments

@target1plus
Copy link

target1plus commented Sep 13, 2022

Hi,
I'm trying to dump client-id-bin and private-key-pem files. However, I only get license_request.bin in the folder. I'm running Frida on a rooted Samsung A8 running on Android 9. The hooking is a success when I run the python file.

Here is the console extraction:

2022-09-13 07:51:00 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_GetProvisioningMethod",
"payload": {
"Method": "OEMCrypto_Keybox"
}
}
2022-09-13 07:51:00 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_GetKeyData",
"payload": {
"Status": "OEMCrypto_SUCCESS",
"Size": 72,
"Device_Token": "000000020000115d4c181b9504cac2ba265fec716cf26ffb9a7c60b77d71f3a7999550227e58bde11a337f3e60b026c499f674bdd00d63baa1228f50296eb1ae2a5392a5f484e363"
}
}
2022-09-13 07:51:00 AM - Helpers.Scanner - 63 - DEBUG - processing device token
2022-09-13 07:51:00 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCryptoVersion",
"payload": {
"Version": 13
}
}
2022-09-13 07:51:00 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityLevel",
"payload": {
"Level": "L3"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_IsInApp",
"payload": {
"in_app": true
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_IsInApp",
"payload": {
"in_app": true
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_GetProvisioningMethod",
"payload": {
"Method": "OEMCrypto_Keybox"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_GetKeyData",
"payload": {
"Status": "OEMCrypto_SUCCESS",
"Size": 72,
"Device_Token": "0000000200001c08b5ccae5953c3fe1bebfa0a96ad8b53342d4e87630b964fc20caea8799880d49f9e182eb800dc6d5936ddfe0bcf6fd76df2783186ecb87709df9b251f9dcfb7cc"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 63 - DEBUG - processing device token
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCryptoVersion",
"payload": {
"Version": 14
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityLevel",
"payload": {
"Level": "L1"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityLevel",
"payload": {
"Level": "L1"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_GetProvisioningMethod",
"payload": {
"Method": "OEMCrypto_Keybox"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_GetKeyData",
"payload": {
"Status": "OEMCrypto_SUCCESS",
"Size": 72,
"Device_Token": "000000020000115d4c181b9504cac2ba265fec716cf26ffb9a7c60b77d71f3a7999550227e58bde11a337f3e60b026c499f674bdd00d63baa1228f50296eb1ae2a5392a5f484e363"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 63 - DEBUG - processing device token
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCryptoVersion",
"payload": {
"Version": 13
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityLevel",
"payload": {
"Level": "L3"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityLevel",
"payload": {
"Level": "L3"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "GetLevel3_GetOEMPublicCertificate",
"payload": {
"Status": "OEMCrypto_ERROR_NOT_IMPLEMENTED"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "GetLevel3_GetOEMPublicCertificate",
"payload": {
"Status": "OEMCrypto_ERROR_NOT_IMPLEMENTED"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "GetLevel3_LoadDeviceRSAKey",
"payload": {
"Status": "OEMCrypto_SUCCESS",
"Session": 2,
"Length": 1312,
"Context": "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"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "GetLevel3_LoadDeviceRSAKey",
"payload": {
"Status": "OEMCrypto_SUCCESS",
"Session": 25602,
"Length": 1312,
"Context": "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"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_IsInApp",
"payload": {
"in_app": true
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "Replacing PrivacyMode"
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_IsInApp",
"payload": {
"in_app": true
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_IsInApp",
"payload": {
"in_app": true
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_GetProvisioningMethod",
"payload": {
"Method": "OEMCrypto_Keybox"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_GetKeyData",
"payload": {
"Status": "OEMCrypto_SUCCESS",
"Size": 72,
"Device_Token": "000000020000115d4c181b9504cac2ba265fec716cf26ffb9a7c60b77d71f3a7999550227e58bde11a337f3e60b026c499f674bdd00d63baa1228f50296eb1ae2a5392a5f484e363"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 63 - DEBUG - processing device token
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCryptoVersion",
"payload": {
"Version": 13
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityLevel",
"payload": {
"Level": "L3"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityLevel",
"payload": {
"Level": "L3"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "GetLevel3_GetOEMPublicCertificate",
"payload": {
"Status": "OEMCrypto_ERROR_NOT_IMPLEMENTED"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "GetLevel3_GetOEMPublicCertificate",
"payload": {
"Status": "OEMCrypto_ERROR_NOT_IMPLEMENTED"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "GetLevel3_LoadDeviceRSAKey",
"payload": {
"Status": "OEMCrypto_SUCCESS",
"Session": 0,
"Length": 1312,
"Context": "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"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "GetLevel3_LoadDeviceRSAKey",
"payload": {
"Status": "OEMCrypto_SUCCESS",
"Session": 25600,
"Length": 1312,
"Context": "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"
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_IsInApp",
"payload": {
"in_app": true
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "Replacing PrivacyMode"
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityPatchLevel",
"payload": {
"Patch_Level": 0
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCryptoVersion",
"payload": {
"Version": 13
}
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSupportedCertificates: OEMCrypto_Supports_RSA_2048bit"
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "Replacing PrivacyMode"
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "PrepareKeyRequest, Captured License Request"
}
2022-09-13 07:51:01 AM - Helpers.Scanner - 57 - DEBUG - processing id
2022-09-13 07:51:01 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityLevel",
"payload": {
"Level": "L3"
}
}
2022-09-13 07:51:02 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMCrypto_LoadKeys",
"payload": {
"Status": "OEMCrypto_SUCCESS",
"Type": "OEMCrypto_ContentLicense",
"Message": "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",
"Signature": "8e716c7ca1ed31e4b590c165ed718195703fea1edd1be324db64fbbe568365ae"
}
}
2022-09-13 07:51:02 AM - Helpers.Scanner - 75 - DEBUG - {
"from": "[email protected]",
"message": "OEMSecurityLevel",
"payload": {
"Level": "L3"
}
}

@d3v1sl1f3
Copy link

hint : you should change KNOWN_DYNAMIC_FUNC

@petarb1988
Copy link

find "libwvhidl.so" on your device, open in text editor, (optional: word wrap for easier reading), find 2nd result of "oemcrypto_le", the line above the 2nd result are the functions you need to place into scripts.js file in KNOWN_DYNAMIC_FUNC instead of the ones that are there

@marana22
Copy link

marana22 commented Oct 6, 2022

really the script is useless if you don't change many things because it won't work for any device

I can give you one for a cheap price
so you don't torment yourself with this script shit

[email protected]

@Marktwain-I
Copy link

Hi
how do you view the contents of the libwvhidl.so file?
Do you use binwalk tools "nm -D libwvhidl.so"?
Is the best (correct) way?
Thank you.

@petarb1988
Copy link

Hi how do you view the contents of the libwvhidl.so file? Do you use binwalk tools "nm -D libwvhidl.so"? Is the best (correct) way? Thank you.

I transfered the files to my PC and opened them with notepad

@nfathoni79
Copy link

find "libwvhidl.so" on your device, open in text editor, (optional: word wrap for easier reading), find 2nd result of "oemcrypto_le", the line above the 2nd result are the functions you need to place into scripts.js file in KNOWN_DYNAMIC_FUNC instead of the ones that are there

I found libwvhidl.so but "oemcrypto_le" is not found

@marana22
Copy link

marana22 commented Nov 25, 2022 via email

@nfathoni79
Copy link

fool El mar, 22 nov 2022 a las 20:16, NN Fathoni @.>) escribió:

find "libwvhidl.so" on your device, open in text editor, (optional: word wrap for easier reading), find 2nd result of "oemcrypto_le", the line above the 2nd result are the functions you need to place into scripts.js file in KNOWN_DYNAMIC_FUNC instead of the ones that are there I found libwvhidl.so but "oemcrypto_le" is not found — Reply to this email directly, view it on GitHub <#52 (comment)>, or unsubscribe https://github.com/notifications/unsubscribe-auth/A2TBRINGZ57NGUNFIWVWQ73WJVV7LANCNFSM6AAAAAAQLLWSA4 . You are receiving this because you commented.Message ID: @.
>

What do you mean?

@petarb1988
Copy link

find "libwvhidl.so" on your device, open in text editor, (optional: word wrap for easier reading), find 2nd result of "oemcrypto_le", the line above the 2nd result are the functions you need to place into scripts.js file in KNOWN_DYNAMIC_FUNC instead of the ones that are there

I found libwvhidl.so but "oemcrypto_le" is not found

weird. i can't help you there, i'm afraid.

@petarb1988
Copy link

petarb1988 commented Apr 22, 2023 via email

@spdustin
Copy link

spdustin commented Jan 11, 2025

If you've got the libwvhidl.so extracted (and nm installed), run this:

echo "const KNOWN_DYNAMIC_FUNC = ["$(nm -gDjp libwvhidl.so | grep -x '[a-z]\{8\}' | awk '{printf "\x27%s\x27, ", $0}' | sed 's/, $//')"];"

Copy/paste the result over the first line in script.js and it should create key_boxes (you don't need this) and private_keys (you need this) the next time it runs.

Copy the folder that contains the client_id.bin and private_key.pem to the devices folder, and rename to device_client_id_blob and device_private_key, respectively (or whatever your next step de-DRM script is looking for)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants