Compare commits
No commits in common. "699d68ffe06f4e193dd82be38ea48ffe99140415" and "3082b4e271581e31342c3e0f4f1ef4de6e372374" have entirely different histories.
699d68ffe0
...
3082b4e271
12
README.md
12
README.md
|
@ -16,11 +16,11 @@ An Android 7-12 device that is able to be rooted.
|
|||
|
||||
#### Tools used
|
||||
|
||||
[Dumper](https://cdm-project.com/CDM-Tools/L3-Dumper "Dumper")
|
||||
[Dumper](https://cdm-project.com/cdm-tools/l3-dumper/-/archive/main/l3-dumper-main.zip "Dumper")
|
||||
|
||||
[DumperV2](https://cdm-project.com/CDM-Tools/DumperV2 "DumperV2")
|
||||
[DumperV2](https://cdm-project.com/cdm-tools/dumperv2/-/archive/main/dumperv2-main.zip "DumperV2")
|
||||
|
||||
[Downey](https://cdm-project.com/CDM-Tools/Downey "Downey")
|
||||
[Downey](https://cdm-project.com/cdm-tools/downey/-/archive/main/downey-main.zip "Downey")
|
||||
|
||||
|
||||
#### Optional
|
||||
|
@ -90,9 +90,9 @@ Login as super user and create a new environment `su -`
|
|||
|
||||
*If you would like to check if frida-server is running connect via adb to your device in new command prompt like in step one, then use `adb shell` and then `su` and then `ps | grep frida` this should show you the process running, if it does not something went wrong* **NOTE: MAY NOT BE APPLICABLE IF MODULE WAS INSTALLED VIA FRIDA**
|
||||
|
||||
Download and extract [Dumper](https://cdm-project.com/CDM-Tools/L3-Dumper "Dumper") for android 7-9
|
||||
Download and extract [Dumper](https://cdm-project.com/cdm-tools/l3-dumper/-/archive/main/l3-dumper-main.zip "Dumper") for android 7-9
|
||||
|
||||
Download and extract [DumperV2](https://cdm-project.com/CDM-Tools/DumperV2 "DumperV2") for android 10-12
|
||||
Download and extract [DumperV2](https://cdm-project.com/cdm-tools/dumperv2/-/archive/main/dumperv2-main.zip "DumperV2") for android 10-12
|
||||
|
||||
Open a new command prompt as administrator and change directories to the newly extracted folder and run `pip3 install -r requirements.txt` and once that's finished, start the program with `python dump_keys.py`
|
||||
|
||||
|
@ -114,7 +114,7 @@ Now we will rename these files, `clent_id.bin` to `device_client_id_blob.` and r
|
|||
|
||||
# Step 3: Obtaining decryption keys
|
||||
|
||||
Download and extract [Downey](https://cdm-project.com/CDM-Tools/Downey "Downey")
|
||||
Download and extract [Downey](https://cdm-project.com/cdm-tools/downey/-/archive/main/downey-main.zip "Downey")
|
||||
|
||||
Open a new command prompt as administrator and change directories to the newly extracted folder
|
||||
|
||||
|
|
Loading…
Reference in New Issue