Black Hole
May contain traces of nut
Does that mean you have a back door?Using a private key that is common across all units, and a shared secret that's also common.. the 2000T code is so much easier to work with than the HDR!
Last edited:

Does that mean you have a back door?Using a private key that is common across all units, and a shared secret that's also common.. the 2000T code is so much easier to work with than the HDR!
No.. I could trivially patch in an all-zero key but we don't have a way of loading modified firmware. I'm just slightly envious at how readable the code is by comparison - I think they must have used a much newer compiler for a start..Does that mean you have a back door?
As I found out a couple of years back. Some HD corruption stopped the box getting as far as initialising the network side of things on booting, so no means of fixing it on the machine. Pulling the HD out and running it up in a PC with a Linux live CD sorted it.: just boot a Live Linux CD/DVD/USB (it doesn't hurt your PC, and is handy to have around).
Yes thanks for that, I had already added an EDIT to my #144 post I.e. :-Code:humax# stripts -/ 11111111111111111111111111111111 test/Bargain\ Hunt_20180502_1218 Encryption key is INCORRECT for this recording.
Last edited: Tuesday at 4:25 PMpointless.zip is encrypted/decrypted and key for a FOX not a 2000T. af123 provided it so that I could work out whether my program/methodology/whatever would do the same job as the utility discussed here (well, the decrypt part). I can decrypt a FOX file given the MAC and S/N. If I do a file comparison, my decrypted version is the same as that in the zip, just 128 bytes larger. It plays.No point (as per post 168), and I missed this bit:
Hmm, the clue was in the mention of "opera".That's in the web browser client code

I'm trying to make sense of this from a Windows computer and a hex dump!I'm just slightly envious at how readable the code is by comparison - I think they must have used a much newer compiler for a start..
I did, but it's academic now as I am satisfied there is no feasible crack process.I thought what you wanted was some data from a 2000T.
I did, but it's academic now as I am satisfied there is no feasible crack process.

Give http://radare.org/r/ a go.I extracted some/all of the 2000T files by cheating. Finding humidify didn't work, I just removed the first few bytes from the .hdf file and hey-presto humidify did work. Whether it extracted everything I don't know.
I'm trying to make sense of this from a Windows computer and a hex dump!
This ^^^main thrust of the thread
2000T is stuffed as far as I know

)Does this help?
Youcould beare right. I only asked because your question followed a reply from af123, which was about the 2000T stuff.
(Just for the record, I'm getting nowhere slowly trying to make sense of the 2000T code for ...LoadClearKey. Need to know where it is called from, with what parameters, and what it returns...)
NEXUS_Security_GetDefaultClearKey(&key);
key.keyIVType = NEXUS_SecurityKeyIVType_eNoIV;
key.keyEntryType = NEXUS_SecurityKeyType_eOdd;
key.keySize = xClearTextHostKeySize;
BKNI_Memcpy(key.keyData, pxClearTextHostKey, sizeof(TCsdUnsignedInt8) * xClearTextHostKeySize);
/* Load clear key to key table. */
if (NEXUS_Security_LoadClearKey(keyHandle, &key) != 0)
typedef struct {
int keySize;
int keyEntryType;// may be in wrong place
int keyIVType;// may be in wrong place
char keyData[0x10];
} NEXUS_SecurityClearKey;
It may well do!Does this help?
or have you got some other reverse engineering software that gets you from mips to C?
No. Just given RecStudio a go. Not very helpful.Have you ever tried the "Retargetable Decompiler" (https://retdec.com) ?
Work stopped play...Where are we with this now? What is the direction?