#1
|
||||
|
||||
Widevine Decryptor or Decryption Process
i have access to 25,000 course on udemy however i am unable to download any course content for DRM. I found an extension on GitHub
https://github.com/Puyodead1/udemy-downloader which require Widevine description key id and and Description key. how i can get those key or anything else to bypass like Widevine l3 decryptor which doesn't work now. |
#2
|
|||
|
|||
Quote:
|
#3
|
|||
|
|||
Widevine has 3 level ( 1 -2 -3 ).
Software based ( level 3 ) Hardware based ( level 1 ) The best way for level 3 is making this : You install AndroidStudio and create virtual machine based on Android. Create a Pixel 7 Pro with API Level 28 and Target Android 9. Download Frida bin for Android https://github.com/frida/frida/releases/download/16.0.8/frida-server-16.0.8-android-x86_64.xz Push the server frida bin on /sdcard with adb cmd and start your emulated android , run the frida server. Create a local linux python VirtualEnv ( install frida pip dependancy as well ). And download this -> https://github.com/wvdumper/dumper * Launch frida server on your emulated Android * Launch the script python wvdumper ... Check if Script get connection to frida. On Emulated android, open a browser and go to an url to play a DRM stream with widevine. ( Ex : https://bitmovin.com/demos/drm ). On your console python log you will see some debug information and can check if your keys has been dumped. In folder of wvdumper -> /key_dumps/ you will get folder tagged by serial Android with inside normally 2 files ( key & cert ) to be used for any downloader... For L1 you need to dump secure area ... some exploits exist based on Widevine servlet to dump the AES key ( AES key will be used to provision cert / key ) on google server. Google at any time can revoke kill keys and company can block as well ... Pay attention that some blacklist L3 .. |
The Following 2 Users Gave Reputation+1 to Souldream For This Useful Post: | ||
blue_devil (04-10-2024), Mendax47 (04-09-2024) |
Thread Tools | |
Display Modes | |
|
|