mirror of
https://cdm-project.com/How-To/Dumping-L3-from-Android.git
synced 2025-04-30 00:54:24 +02:00
Update README.md
- Changed from using dumper to KeyDive - Removed irrelevant info
This commit is contained in:
parent
ab898f7532
commit
89bc9e5720
14
README.md
14
README.md
@ -4,7 +4,7 @@
|
||||
|
||||
[ADB](https://dl.google.com/android/repository/platform-tools-latest-windows.zip "ADB Minimal Install")
|
||||
|
||||
An Android 7-12 device that is able to be rooted / is rooted.
|
||||
An Android 7-14 device that is able to be rooted / is rooted.
|
||||
|
||||
# Step 1: Enable ADB and connect to device.
|
||||
|
||||
@ -56,20 +56,12 @@ Login as super user and create a new environment `su -`
|
||||
|
||||
# Step 3: Extracting the CDM
|
||||
|
||||
Download and extract [dumper-wvdumper](https://cdm-project.com/Android-Tools/dumper-wvdumper "Dumper") for android 7-9
|
||||
|
||||
Download and extract [dumper-diazole](https://cdm-project.com/Android-Tools/dumper-diazole "Dumper") for android 10-12
|
||||
|
||||
Open a new command prompt as administrator and change directories to the newly extracted folder and run `pip3 install -r requirements.txt` and once that's finished, start the program with `python dump_keys.py`
|
||||
Download, extract and run [dumper-wvdumper](https://cdm-project.com/Android-Tools/KeyDive "KeyDive")
|
||||
|
||||
Now play some widevine encrpyed content on your Android device. I suggest using [https://bitmovin.com/demos/drm](https://bitmovin.com/demos/drm "https://bitmovin.com/demos/drm") playing over google chrome.
|
||||
|
||||
Once you have played the content your keys should be dumped in the dumper folder under `/key-dumps/your-device-keys/xxxx/xxxxxxxx/` and should be named `client_id.bin` and `private_key.pem`
|
||||
Once you have played the content your keys should be dumped and should be named `client_id.bin` and `private_key.pem`
|
||||
|
||||
Make a copy of these for safekeeping wherever you like but DO NOT LOSE THEM
|
||||
|
||||
*You can now close out of running frida server if you are running it over adb, you may also close dumper once you have verified successful dumping.*
|
||||
|
||||
Make sure to have file extensions visible on windows, this can be turned on by searching "show file extensions" in the windows search bar.
|
||||
|
||||
Now we will rename these files, `clent_id.bin` to `device_client_id_blob.` and rename `private_key.pem` to `device_private_key.` **The periods on the end is intentional as windows likes to keep file extentions, please make sure to have this exact or it will cause errors! Only rename with windows, using a program such as text editor and saving under all files will still corrupt the data!**
|
||||
|
Loading…
x
Reference in New Issue
Block a user