💾 Archived View for spam.works › mirrors › textfiles › hacking › skyhack.hac captured on 2023-11-04 at 13:26:41.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-



?????????  THIS FILE WAS LEECHED FROM...
?????????
???? ????
???   ???
???    ?   ?    ??   ??             ?       ?    ?
????????? ??? ??????????? ???????  ???     ???  ???
????????? ??? ??????????? ???  ??? ???    ????  ????
?????????  ?  ??? ??? ??? ???  ??? ???    ????  ????
 ?    ??? ??? ??? ??? ??? ???  ??? ???    ????  ????
???   ??? ??? ??? ??? ??? ???  ??? ???     ????????
???? ???? ??? ??? ??? ??? ???????  ???     ????????
????????? ??? ???  ?  ??? ???      ????????  ????
????????? ??? ???     ??? ???      ???????    ??
           ?   ?       ?                      ??
             ?     ?       ??????   ?   ?      ?     ??   ??    ?    ?
R         ??????? ???     ???  ??? ??? ??? ???????  ?????????  ???  ???
 E    O   ??????? ???     ???  ??? ??? ??? ???  ?? ??????????? ???  ???
  A    F  ??? ??? ???     ???      ??? ??? ???     ??? ??? ??? ???  ???
   L      ??? ??? ???     ???      ??? ??? ?????   ??? ??? ??? ????????
    M     ??? ??? ???   ? ???  ??? ??????? ???     ??? ??? ??? ????????
     S    ??????? ??????? ???  ??? ??? ??? ???  ?? ???  ?  ???   ????
          ??? ??? ???????  ??????  ??? ??? ??????? ???     ???    ??
           ?   ?   ?????            ?   ?   ?????   ?       ?     ??
                         ??????????                                ?
  ???? ?? ? ??? ??? ???    ??????    ??  ???    ???? ? ?  ???      ?
  ? ?? ?? ? ? ? ??? ?       ?  ?      ?  ????   ?  ? ???  ? ?
   ??? ???? ? ? ? ? ???    ??????     ?  ?  ?   ???? ???  ? ?  ?
  ???? ? ?? ? ? ??? ?    ??????????   ?  ?  ?   ?  ? ???  ? ? ??
  ???? ?  ? ??? ??? ????             ??? ???? ? ???? ? ?  ?????
                          24 HOURS                          ?? ???
                                                            ?  ? ?
      ? ? ? ?  ? ???? ? ?  ???? ? ? ???  ? ? ??? ??? ????      ???
   ?  ? ? ? ? ?  ?  ? ?  ? ?  ? ? ? ?    ? ?   ?   ? ?  ?      ? ?
  ??? ??? ??? ?  ???? ?  ? ???? ??? ???  ???  ??  ?? ????      ???
   ?    ?   ? ?  ?  ? ?  ? ?  ?   ?   ?    ? ??  ??  ?  ?
        ?   ?  ? ???? ? ?  ????   ? ???    ? ?   ??? ?????
  Inflating: skycard.txt            


                        ***  The Videocrypt System ***

     An Overview

     Researched and written by Darren Ingram, author of Satnews

     - Satnews.. the latest and non-Commercial satellite news -


     Version 1.31 - 06.05.91


     Introduction

     Videocrypt is a pay-tv scrambling system jointly developed by  Thom-
     son Consumer Electronics and News Datacom.   Over one million  users
     receive  Videocrypt encrypted signals and this system, has to  date,
     remained  secure from illicit decoder manufacturers, protecting  the
     revenue of Videocrypted television channels.

     Requirements

 
     Videocrypt  is a multi-standard encryption system which is  suitable
     for  PAL, NTSC and SECAM transmissions.  Language is no barrier  for
     Videocrypt  with  its capacity for multi-lingual  transmissions  and
     broadcasts utilising a comprehensive on-screen instruction menu.

     Features and applications

     A  smart card is the central key to the Videocrypt system,  and  the
     card  can be used for a variety of diverse applications.   The  card
     is  pre-coded  to determine a users requirements and it  can  subse-
     quently be addressed utilising the decoders logic to amend the users
     services at the broadcasters will.

     There are a number of broadcasting modes which the smart card can be
     used within including:

     Clear Mode
     Signals sent in the clear are recognised by the decoder and
     passed to the display without further processing.

     Free Access
     Pictures transmitted with an encryption key are delivered
     directly to the display through the decoder.
 

     Controlled Access
     Access to encrypted pictures is determined by the level
     of access authorised to the users smart card.  No signals
     will be transmitted in an unencrypted state without prior
     authorisation.

     Programmes can be tailored to usage with the Videocrypt system and
     the system offers a flexible way for pay-tv operators.  There are  a
     number of operations mode offered as standard including:

     * Single or multiple subscriptions with many tier levels in one
     channel

     * Pay Per View (PPV) and impulse purchasing

     * Thematic selection (enable all arts programming)

     * Geographic limitation (restrict to a country/area)

     * Single-event (throwaway cards)

     * Parental Control (reception with card only)

     * Pre-determined time period

     Videocrypt  enables  smart cards to be pre-programmed  to  suit  the
     specific programming requirements.

     Smart card - providing the revenue security

     Security  can be addressed on a multitude of levels when  using  the
     smart card.  These include:

     Chaining

     An existing customer would receive a new card which contains part of
     the  new code, the remainder of the code would be  transmitted  when
     the  card is inserted into the decoder and the  subscriber  compiles
     with the instructions contained within the on-screen graphics.

     Over-the-air addressing

     Systems operators can now address individual subscribers, which is a
     vast  improvement over other scrambling systems.  The  operator  can
     provide  additional  services,  reduce  service  entitlements,  send
     individual messages, blacklist and/or whitelist viewers.

     Cloning

     A  number of steps have been taken to stop smart cards being  copied
     or cloned.   A physical deterrent is the first line of defence,  and
     the  integrated  circuit contained within the card  makes  "probing"
     very difficult as the IC is likely to become damaged in the process.

     Cost  is a second factor which is likely to deter  manufacturers  of
     illegal  decoders.    A  considerable amount of  time,  trouble  and
     expensive resources would be required to clone the card.

     The  manufacturers  of Videocrypt recommend that the cards  are  re-
     placed  every six months, and each time this is done a  "secret  en-
     crypting  algorithm" will be changed.  Any pirate decoders  manufac-
     tured during this time would be relatively useless.

     And  should  a  pirate decoder be manufactured, it  will  contain  a
     unique  security  code, which could be blacklisted  by  the  systems
     operator  once  the code has been discovered - leading to  calls  of
     complaint by angry customers.

     Video taping

     Videocrypt  offers  an simple method of tracking  down  pirates  who
     video high-value programming and then distribute it.

     The customers unique number can be displayed on the unencoded screen
     for  reference  and future litigation.   Although  an  on-the-screen
     code  can  be generated for signals piracy in a  public  place,  the
     codes  can be hidden in the picture - and retrieved by a  technician
     at a later stage.

     Videocrypt-your flexible friend?

     Videocrypt  can  be used in a number of applications other  than  tv
     signals protection.  They include:

     Messaging, messages can be transmitted to individual subscribers  or
     to a group, so target messaging is now a potential.  Messages  like:
     "Satellite  owners in LONDON call 081 XXX XXXX now for a great  bar-
     gain".

     Selling, sales over the air can be utilised with the unique identity
     number which verifies an owner and their registered address.    Data
     can be matrixed with a user personality during ad-breaks to  tailor-
     make the advertisement.

     A unique transaction alphanumeric can be displayed on the TV screen,
     and  the  subscriber  will telephone a given number  and  quote  the
     alphanumeric - and the deal can then be completed in total security.

     Scrambling

     The  majority  of  scrambling systems currently on  the  market  are
     dependent on analogue processing circuitry, and it is a hard task to
     get a secure system without picture deterioration.

     Videocrypt can encode and decode a picture without degradation.

     The crux of the scrambling system evolves around a patented develop-
     ment of Active Line Rotation (Cut and Rotate principle).

     Every  line  of the signal is cut at a number or  points  along  its
     length,  and  this  is chosen at random by a 60  bit  psuedo  random
     binary  sequence generator (PRBS).   As each cut point differs  from
     the next the signal has no viewing value to an unauthorised  recipi-
     ent,  but authorised recipients decoders recode the picture so  that
     the  true  state  of the unscrambled line is always  first  out  for
     display.

     The  PRBS is re-seeded at times too, to enhance the security of  the
     system even more.

     Before  this  ALR process can take place, the decoder  needs  to  be
     aware  of  the cut point on each of the transmitted lines,  this  is
     provided  within the encryption process.  Each decoder  utilises  an
     PRBS  which reflects the characteristics of the system so  that  the
     two halfs can be synchronised and a viewable picture displayed.

     Data is transmitted in a series of over-the-air packets, which looks
     like:

     SYSTEM-----SMART or BLACKLIST

     The system comprises of system data included Flat-Shamir identifica-
     tion  information,  on-screen display messages,  fingerprinting  and
     blacklisting data.

     The smart card packet comprises of:

     HEADER-----ENCRYPTED DATA-----CHECKSUM

     The  Videocrypt encryption system is based around a  tightly-guarded
     secret  which has defeated system hackers throughout the world.    A
     final control algorithm is central to the systems security and  this
     can be changed at will if the system has been hacked.

     Complex calculations are performed within the system in order not to
     compromise its security.

     But  hackers who have attempted to hack the decoder will  be  disap-
     pointed - as there are no secrets held within the system.

     Smart Cards
     The smart card offers great flexibility to the programme  controller
     and the viewer alike, and is the key to the Videocrypt system.

     The  Integrated circuits incorporated within the smart card  have  a
     lot  of power and contain EPROM elements which are partially  burned
     during their manufacture.   The ICs are buried within the design  to
     make the system harder to penetrate.

     Smart card block diagram


     -------     -------     -------
     VCC  ->       - RAM -     - ROM -     -EPROM-
     -------     -------     -------
     ^           ^           ^
     TO AND FROM
     -------------------------------
 GND ->        -    INTERNAL BUS             -
     -------------------------------
     TO AND FROM
     -------     -------     -------
     -8 BIT-     -ANTI -     -S/WRE-
 RST ->        -CPU  -     -FRAUD-     -CNTRL-
     -     -     -DVCES-     -I/FCE-
     -------     -------     -------


     CLK        VPP           I/O

     Over the air addressing

     Algorithmic  information is transmitted to the viewer over the  air,
     encrypted within the Videocrypt system.

     This data is transmitted within the Vertical Blanking Interval (VBI)
     and  four  lines are employed for active data and  two  others,  one
     white and one black (for test purposes).

     An  application of Non Return To Zero (NRZ) with an constant  energy
     spectrum maximises the systems characteristics.

     Four picture-sustaining techniques are used to ensure a high quality
     picture.  Bit interleaving, hamming codes, quadruple repetition  and
     check sums are used within the process.

     The  system  can  cope with fringe reception areas  and  will  still
     function correctly with high levels of noise.

     Picture quality

     Picture  quality is paramount for any scrambling system and  due  to
     the  standard being of a digital origin, integrity of the signal  is
     maintained  throughout  the encryption  and  de-encryption  process.
     Amplitude sampling is conducted by the decoder and a 14MHz  internal
     clock  ensures jitter-free pictures and unstable framing.   A  digi-
     tally  derived Automatic Gain Control (AGC) is also included  within
     the receiver.

     Scrambling Sound

     Videocrypt  also has the capability of encrypting sound  sources  to
     enhance  the  security  of premium events.  To date  this  level  of
     security has not been utilised by broadcasters.

     The system of spectrum inversion renders the sounds received without
     authorisation  worthless.   Videocrypt  transposes  the  frequencies
     transmitted and this in turn removed distortion of the sound.

     Technical Data
     (supplied by Thomson Consumer Electronics, 1991- subject to change)

     VIDEOCRYPT BASEBAND DECODER
     * Stand alone video decoder
     * On screen display
     * De emphasis switch
     * Authorise button
     * Integrated smart card reader
     * Power indicator

     PAL MODEL
     Video input level             IV +/- 3dB flat and clamped
     Baseband input level          250 mV +/- 3dB, unclamped level
     measured at pre-emphasised transition
     frequency
     Suitable de-emphasis          CCIR 405-1
     Video output level            IV p.p. into 75 ohms
     Video bandwith                50Hz - 4.8 Mhz -3dB typical
     Line tilt                     <_ 1% typical
     Luma/Chroma Delay             +/- 50nS typical
     S/N ratio:                    50dB typical weighted

     CONNECTIONS
     AV Peritel (Scart)
     Audio loopthrough             Left and right
     Pin 8                         High with scrambled video input
     Low with clear video input
     Pin 16                        5v 50mA maximum for external
     modulator (OPTION)

     MISCELLANEOUS
     Standards                     Designed to IEC 65
     Operating Temperature Range   5-40 C
     Mains Input                   216-255 V AC 50 Hz
     Power Consumption             15W
     Weight                        2.5Kg

     VIDEOCRYPT ENCODER (PAL/SECAM/NTSC)
     * 19" rack mounting
     * Active line cut and rotate
     * Twin or single scrambler
     * Separate power supply
     * Integrated cooling unit
     * Data for control access in the VBI
     * RS232 interface

     Video input level             IV 75 ohm
     Video output level            IV peak to peak +/- 2% 75 ohm
     Line tilt                     0.5% typical
     Base line distortion          0.5% typical
     Chrominance to luminance      3% typical
     2T/Bar ratio                  2% typical
     Synchro level                 1% typical
     S/n ratio RMS weighted        >_ 67dB
     Chrominance luminance:
     intermodulation              <_ 2%
     differential gain            1% typical
     differential phase           1" typical
     luminance non-linearity      1% typical
     chrominance/luminance delay  +/- 10nS typical
     video bandwith at 3dB        >_ 5.8 Mhz
     Output DC level               300 mV +/- 50 mV
     Sampling frequency rejection  >- 50dB at 14 Mhz
     Number of bits per sample     10

     CONNECTIONS
     Connections to security comp  RS232
     Local VT100 terminal          ditto
     Video in                      BNC 75 ohm
     Scrambled video out           BNC 75 ohm

     MISC
     Local terminal functions are to
     show working parameters
     give warnings
     control local
     remote
     autonomous
     Select scrambling mode
     clear
     free access
     control access

     Mains input low pass filtering
     Audio scrambling using spectrum
     inversion 0dB/600 ohm (optional)

     ENDS


                **** Sky card hacking info 26/06/1993 ***


 

     When  the  VideoCrypt  system was  launched,  the  press  releases 
     claimed that it was the most pirateproof system yet devised.  Some 
     of the people involved in the design of the system claimed that it 
     would  take  billions  of years to break the  codes  used  by  the 
     system.  The usual media journalists swallowed this hook line  and 
     sinker. The hackers knew otherwise. 

     The  VideoCrypt  system  is the mainstay of  the  BSkyB  satellite 
     television empire. It is the means by which BSkyB makes its  money 
     from  the  subscribers.  The  basic theory  is  that  they  pay  a 
     subscription  for  the premium channels and they receive  a  smart 
     card.  This smart card, when inserted into the VideoCrypt  decoder 
     will allow the decoder to descramble the channels paid for. It  is 
     also possible for BSkyB to turn off the cards of those subscribers 
     who have not paid.

     Hacking  scrambling systems such as VideoCrypt is a  multi-million 
     pound industry. Due to the present legal situation it is perfectly 
     legal  to hack a channel that originates outside the  UK.  However 
     for someone in the UK to hack a UK originated channel is  illegal. 
     Such mere facts as illegality have never bothered pirates.

     In the last few weeks the impossible has happened. The  VideoCrypt 
     system  has  been  conclusively  hacked. It  is  now  possible  to 
     purchase  a pirate smart card or chip which will allow the  viewer 
     to  descramble Sky Movies Plus, The Movie Channel, Sky  Gold,  Sky 
     Sports and TV Asia. The cost of this pirate card is ?99. The price 
     in itself is lower than the subscription for the channels.

     Other channels using the VideoCrypt system. Are worried. According 
     to  the  latest  reports, The Adult Channel  and  JSTV  have  been 
     compromised as well. This means that all of the channels currently 
     using  the VideoCrypt system as a fee gathering system  have  just 
     lost control of the market. It is now, well for the moment anyway. 
     a pirate's market.

     This  hack is, like all hacks, colourfully named. It is  known  as 
     the "Ho Lee Fook" hack. The joke being that this is generally  the 
     exclamation uttered by people when told of the hack. There are two 
     forms of the hack; a card and a chip. 

     The  card version of the hack is about sixteen millimetres  longer 
     than  the  official BSkyB card. Essentially it is  a  single  chip 
     mounted  on a printed circuit board that plugs directly  into  the 
     VideoCrypt  decoder's card socket. This is the more  user-friendly 
     version as it does not require any modification to the decoder.

     The  chip version does require some modification to  the  decoder. 
     The  official VideoCrypt name for the chip in the decoder is  "The 
     Verifier".  This  chip  has to be removed and  replaced  with  the 
     pirate  chip. The decoder will then decode the scrambled  channels 
     without the need for the BSkyB smart card.

     The  pirate cards and the chips are on sale. It is  believed  that 
     a number of them are already in the UK. Indeed I received one,  in 
     a brown paper envelope, on June the eighth. It is still working.

     The problem for BSkyB and other users of the VideoCrypt system  is 
     not  one of containment. Things have progressed too far for  that. 
     The problem is more serious. Unless they can come up with a  quick 
     fix for the system that will render the Ho Lee Fook hack inactive, 
     they have to replace the smart cards.

     BSkyB  initially set out to replace their smart cards every  three 
     months.  This continual update was, so the theory went,  meant  to 
     deter hackers from trying to hack the system. Fiscal reality has a 
     crushing  effect of such business school theories. 

     VideoCrypt   suffered  its  first  real  disaster   when   someone 
     discovered  that by limiting the programming voltage to the  card, 
     it was possible to stop the card being switched off. This hack was 
     known  as the "Infinite Lives" hack. It was an old  computer  term 
     for  a  modification  to  a games program  that  gave  the  player 
     unlimited  lives.  Since  BSkyB could not turn off  the  cards  it 
     seemed an apt name. This hack was followed by a new issue or batch 
     of cards. The "Infinite Lives" hack did not work on the new  cards 
     but a new hack did.

     The KENtucky Fried Chip upped the ante. It was the first time that 
     the  actual  internal  operation of  the  VideoCrypt  decoder  was 
     interfered  with.  It  was a rewritten "Verifier"  chip  that  was 
     programmed to stop the cards being turned off. It did not work  at 
     full efficiency so it was not marketed by the pirates. After  this 
     hack,  BSkyB issued a new batch of cards which was more  resilient 
     to this hack.

     The  current  card  issue is issue 07. The Ho  Lee  Fook  hack  is 
     working  on  this batch. If BSkyB introduce issue 08  cards,  then 
     there  is  the possibility of the hack ceasing to  work.  At  this 
     stage  there is the terrible spectre of the hack being updated  to 
     work  with  the  08  cards.  It is  the  thing  of  which  BSkyB's 
     nightmares are made of.

     The issue of new card batches occurs mainly in Spring or Autumn. A 
     Summer launch of the new 08 cards would be unusual. As  VideoCrypt 
     will  be  going to a tiered channel structure in  the  Autumn,  it 
     would  seem  that they have planned an Autumn update. The  Ho  Lee 
     Fook  hack  may force them to bring their plans  forward  by  some 
     three months or so.

     The  confidence  in  a system is not based on how  well  a  system 
     repels hacks but rather on how well a system recovers from  hacks. 
     This  will be a true test of the VideoCrypt system and  its  smart 
     card  based philosophy. The philosophy is that of  the  detachable 
     secure controller. Basically what this means is that if the system 
     is  hacked then all that needs to be done to stop the hack  is  to 
     issue a new card.

     The effects on the confidence of present and prospective users  of 
     VideoCrypt is more difficult to gauge. The smart card is the  core 
     of  the  VideoCrypt system. Seeing it replaced by a  pirate  smart 
     card contradicts every claim made in favour of VideoCrypt. It  was 
     not  supposed to be possible. One thing is certain, channels  will 
     now have to look at a scrambling system as only being a  temporary 
     form  of protection that has to be frequently updated. Failure  to 
     do so will be fatal.

     John McCormac
     Author of "European Scrambling Systems 3" ISBN 1-873556-02-0
     Editor of Hack Watch News.---
 
                                *** Latest ***


     There is no such thing as coincidence - or is there? On the day that
     the film "Sneakers" was released on video, I received an actual working
     hack for the scrambled Sky channels. The film "Sneakers" is about
     events surrounding a piece of equipment that can hack any cryptosystem.
     The piece of equipment that I received is essentially a chip that can
     hack the Sky VideoCrypt channels. 
     This latest hack on the VideoCrypt system has been labelled the "Ho
     Lee Fook" hack. The reason for this name is more to do with people's
     reaction to the hack rather than its origin, which incidentally is
     Central Europe. 
     This is perhaps the most dangerous hack to have occurred on VideoCrypt
     - it replaces the smart card. In effect it is a new smart card that
     gives access to all the Sky channels. Of course the problem for Sky is
     that it is not a genuine Sky card.

     The card is approximately sixteen millimetres longer than the official
     Sky card. It is a blue printed circuit with a single surface mount
     chip, and five connector pads. The identification numbers on the chip
     have been scrubbed. 
     The standard check for a card of this nature is to look for a wafer
     from an official smart card. In the early days, a fairly common scam
     was to take the chip and connector pad from a valid Sky card, trim away
     the plastic and then put the chip in a DIL header. The DIL header would
     then be blobbed in a lump of black resin so that it looked like an IC.
     The decoder would then have its card reader replaced with an ordinary
     DIL IC socket. Then the decoder and chip would be shown or sold to some
     unsuspecting, if greedy, punter. 
     The chip appeared to be real, with no wafer underneath the body of the
     chip. The actual stubs of the chip die were just visible at the end of
     the chip. It was a genuine chip.

     It has been working steadily for the last few days and there appears
     to have been no kill messages sent to it. If it had been a direct
     clone, Sky would have been able to kill it over the air - or would
     they? 
     Since the people who developed this hack obviously understand the
     operation of the over the air addressing, they may well have designed a
     filter to stop the kill message from having any effect of the pirate
     card. There are of course more devastating implications here. The card
     itself may only contain the data and algorithms necessary to descramble
     the signals. 
     The chip version of this hack is based on the 8752. This Ho Lee Fook
     chip will replace the official 8052 in the decoder. A selling price of
     ninety nine pounds has been mentioned in Germany.

     Nobody is sure what the people in News Datacom are doing about this
     hack. Sky are more than likely very upset that someone has hacked their
     pirateproof system yet again. This is the fifth hack and the image of a
     pirateproof system now only exists in the minds of PR people.



                *** -=Y_HS=- all (c)'s acknowledged ***