|
From: Manuel P. <ha...@cc...> - 2009-02-25 13:13:38
|
Hi Tomasz! Thanks for your answer! You wrote: > I tried to write some Python script to do it, but so far > had problems with extracting packet data from dump - I am > not exactly networking expert, so tcpdump and pcap are > rather mysterious beasts to me. Well, I would not consider myself an expert in this area as well. I just started with pcap and am surprised how neat and easy it actually is. > Can you publish this program somewhere or put it on the list - so > we could look at it? Sure. I can't access the files right now but will send them here. It's quite hackish, though. > At the beginning you should see many tags with beta key - and > later you should see more and more tags with final 25C3 key. > Occasionally you should also see tags with key from 24C3. Is there any sane way of determining which key to use? As I currently see it, the protocol version information is /inside/ the encrypted data, so the only way I see to retrieve the packet data is to try every key and check for the packet that has the correct CRC, right? > Show the source! ;-) Will do, stay tuned! ;) Best regards Manuel |