en nabilosat a comfirmar a ver si hay suerte

New Emulacion Nagra 2 -D+ Spain by Calpe 19
not tested for more ifo`s take a look here
http://nabilosat.sky-top.net/forum/s...1695#post31695
Code:
[Original Keys]
gkeypubbeta=A4 E9 B5 85 93 2F 90 28 2F D7 0C 90 81 76 E8 60 5E 6B 2C E6 29 33 5A 0F C1 5B 31 DA B0 BF C6 FE EB 88 CF C6 96 49 99 4C D3 FE 03 9C 99 65 C6 20 C4 D5 82 8E 91 53 99 8E E4 AE 0E 8C 25 64 4D F3
gkeypub=23 72 80 AA B3 6B E4 B2 1F C7 1F BF 08 21 8E 53 2A 54 5E 74 4D 7B 00 7F F8 69 BA 42 68 31 C4 AC 65 3F 38 25 AD E9 35 8F CD 1F 02 39 EC 44 7C BC 27 65 CC 0A EB E4 37 AF 22 70 FC 46 1C 2F A0 42
Step 1: XOR gkeypubbeta with IRD Public Modulus
gkeypubbeta=A4 E9 B5 85 93 2F 90 28 2F D7 0C 90 81 76 E8 60 5E 6B 2C E6 29 33 5A 0F C1 5B 31 DA B0 BF C6 FE EB 88 CF C6 96 49 99 4C D3 FE 03 9C 99 65 C6 20 C4 D5 82 8E 91 53 99 8E E4 AE 0E 8C 25 64 4D F3
IRD Public Modulus (N)=CF 35 75 0A 91 EB 66 E4 53 6A BF D6 1D C5 F4 6B 9A 59 90 E6 63 EC C9 3E BF FF 31 2D FA A2 82 90 C3 40 2E 9D 08 6D 1E 00 44 7F CC 88 F3 87 92 14 33 F2 7C FC B3 DA 32 20 C2 A3 F0 FB BE CD 99 3F
New gkeypub xor value=6B DC C0 8F 02 C4 F6 CC 7C BD B3 46 9C B3 1C 0B C4 32 BC 00 4A DF 93 31 7E A4 00 F7 4A 1D 44 6E 28 C8 E1 5B 9E 24 87 4C 97 81 CF 14 6A E2 54 34 F7 27 FE 72 22 89 AB AE 26 0D FE 77 9B A9 D4 CC

Code:
New gkeypub=6B DC C0 8F 02 C4 F6 CC 7C BD B3 46 9C B3 1C 0B C4 32 BC 00 4A DF 93 31 7E A4 00 F7 4A 1D 44 6E 28 C8 E1 5B 9E 24 87 4C 97 81 CF 14 6A E2 54 34 F7 27 FE 72 22 89 AB AE 26 0D FE 77 9B A9 D4 CC

Code:
Step 1: Find P and Q, two large (i.e. 256-bit) prime numbers.
Create two random 256-bit prime numbers: (i.e. P and Q)
Note: P and Q are private.
P=F9 31 3B C3 13 25 86 3A ED 9C FE FE 25 F3 9A D7 91 5C 01 3D 3A C4 BD 8B 86 5D 0F 9C 8C 31 C4 AD
Q=D4 DE 9A FA 3C 79 B5 BA 05 94 F5 78 0D 76 3F 00 45 19 5A 18 9B E2 41 79 A5 1B 21 C0 3E 65 A7 1B
Step 2: Now multiply P and Q to get N:
The product of PQ is the modulus (often called N in the literature).
PQ=CF 35 75 0A 91 EB 66 E4 53 6A BF D6 1D C5 F4 6B 9A 59 90 E6 63 EC C9 3E BF FF 31 2D FA A2 82 90 C3 40 2E 9D 08 6D 1E 00 44 7F CC 88 F3 87 92 14 33 F2 7C FC B3 DA 32 20 C2 A3 F0 FB BE CD 99 3F
Now we have the public modulus N:
N=CF 35 75 0A 91 EB 66 E4 53 6A BF D6 1D C5 F4 6B 9A 59 90 E6 63 EC C9 3E BF FF 31 2D FA A2 82 90 C3 40 2E 9D 08 6D 1E 00 44 7F CC 88 F3 87 92 14 33 F2 7C FC B3 DA 32 20 C2 A3 F0 FB BE CD 99 3F
N will be the IRD Public Modulus (N) - used to encrypt your your DT08. This will also be used by the IRD to decrypt DT08.
Step 3: Choose E so that;
E it is larger than 1.
E is less than PQ.
E must be relatively prime to (P-1)(Q-1).
This means they have no prime factors in common.
E does not have to be prime, but it must be odd.
(P-1)(Q-1) can't be prime because it's an even number.
For Dish Network the public exponent is 0x03 we do not need to calculate this at this time.
E=03
Step 4: Using the formula D=((((P-1)(Q-1))*2)+1)/E we can calculate the private exponent D.
E=03
(P-1)=F9 31 3B C3 13 25 86 3A ED 9C FE FE 25 F3 9A D7 91 5C 01 3D 3A C4 BD 8B 86 5D 0F 9C 8C 31 C4 AC
(Q-1)=D4 DE 9A FA 3C 79 B5 BA 05 94 F5 78 0D 76 3F 00 45 19 5A 18 9B E2 41 79 A5 1B 21 C0 3E 65 A7 1A
(P-1)(Q-1)=CF 35 75 0A 91 EB 66 E4 53 6A BF D6 1D C5 F4 6B 9A 59 90 E6 63 EC C9 3E BF FF 31 2D FA A2 82 8E F5 30 57 DF B8 CD E2 0B 51 4D D8 12 C0 1D B8 3C 5D 7D 21 A6 DD 33 33 1B 97 2B BF 9E F4 36 2D 78
((P-1)(Q-1))*2=01 9E 6A EA 15 23 D6 CD C8 A6 D5 7F AC 3B 8B E8 D7 34 B3 21 CC C7 D9 92 7D 7F FE 62 5B F5 45 05 1D EA 60 AF BF 71 9B C4 16 A2 9B B0 25 80 3B 70 78 BA FA 43 4D BA 66 66 37 2E 57 7F 3D E8 6C 5A F0
(((P-1)(Q-1))*2)+1=01 9E 6A EA 15 23 D6 CD C8 A6 D5 7F AC 3B 8B E8 D7 34 B3 21 CC C7 D9 92 7D 7F FE 62 5B F5 45 05 1D EA 60 AF BF 71 9B C4 16 A2 9B B0 25 80 3B 70 78 BA FA 43 4D BA 66 66 37 2E 57 7F 3D E8 6C 5A F1
((((P-1)(Q-1))*2)+1)/3=8A 23 A3 5C 61 47 99 ED 8C F1 D5 39 69 2E A2 F2 66 E6 60 99 97 F3 30 D4 7F FF 76 1E A7 17 01 B4 A3 75 8F EA 7B 33 EC 07 8B 89 3A B7 2A BE 7A D2 E8 FE 16 6F 3E 22 22 12 64 C7 D5 14 A2 CE C8 FB
Now we have the private exponent D:
D=8A 23 A3 5C 61 47 99 ED 8C F1 D5 39 69 2E A2 F2 66 E6 60 99 97 F3 30 D4 7F FF 76 1E A7 17 01 B4 A3 75 8F EA 7B 33 EC 07 8B 89 3A B7 2A BE 7A D2 E8 FE 16 6F 3E 22 22 12 64 C7 D5 14 A2 CE C8 FB
D will be the IRD Prvate Exponent (D) - used to encrypt your your DT08.

Code:
ATR -> 3F FF 95 00 FF 91 81 71 FE 47 00 44 4E 41 53 50 31 31 30 20 52 65 76 41 30 31 14
EEprom -> RevA01
Rom -> DNASP110
Tipo -> Nagra 2
================================================== ===================
#Petición de TAMAÑO de CAMPO de INFORMACIÓN
->21C101FE1F
<-12E101FE0C
100 Ms.
#Petición de ESTADO del CAM
->210008A0CA000002C0000687
<-120008B00400C300009000FD
#Petición de NÚMERO DE SERIE
->214008A0CA00000212000615
<-12400892041B96XXXX9000XX
100 Ms.
#Petición de CICLO DE PROCESO
->210008A0CA0000021500085C
<-12000A95060E5555600E5590002E
100 Ms.
#Petición de ESTADO del CAM
->214008A0CA000002C00006C7
<-124008B00400C100009000BF
#Solicita IDENTIDAD de DATOS ACTUALIZADOS
->210008A0CA000002C7000482
<-120006B702FFFF900031
100 Ms.
#Petición de UN ITEM de un TD
->214009A0CA0000032201001C3E
<-12401EA21A2AFF90000040010108010101094EXXXX00000000 XXXX1359A8BF900037
100 Ms.
#Petición de UN ITEM de un TDC0
->210009A0CA0000032201C01EBC
<-120020A21C2AFF90000040010108010101094EXXXX00000000 XXXX1359A8BF106590003A
100 Ms.
#Petición de UN ITEM de un TD80
->214009A0CA0000032201801CBE
<-12401EA21A0000000000000000000000000000000000000000 000000000000900064
#Petición de UN ITEM de un TD08
->210009A0CA000003220108553F
<-120057A25352F0000000400108FF4980F59B64116505EEF3AA 3A344A65505B309FE68DAA6D82DFF3A24A02F7XXXX98B459E2 2EE49C92972B081B73FEDBEDB23E707DFEC1B9E835F6F60056 6283696C9A9784A093F0A62A7C9000B1
100 Ms.
#Petición de UN ITEM de un TDC8
->214009A0CA0000032201C855BF
<-124057A25352F0000000400108FF4980F59B64116505EEF3AA 3A344A65505B309FE68DAA6D82DFF3A24A02F7XXXX98B459E2 2EE49C92972B081B73FEDBEDB23E707DFEC1B9E835F6F60056 6283696C9A9784A093F0A62A7C9000F1
#Petición de UN ITEM de un TD88
->210009A0CA00000322018813F9
<-120015A2110000000000000000000000000000000000900024
100 Ms.
#Petición de DATOS ALEATORIOS
->214008A0CA0000022A004269
<-124044AA409710AC62BAF02DC7EF3A61FDEC368D37876C7D25 5B9F402F909270703A7EC6211CC540F54E102150A4E7AE3FBE F624C1486270D8AC77389E29DA493ADED091189000D1
#Envío de nueva Session KEY BCB4F273F4B65904177EA442D5E9F25A
->210048A0CA0000422B402702E9B239FCDA594B3820D47313E 6 095C6ECAE27BDAC2CE25D1CC787BDFE61DF4676B9EC4264FCE A2EEB4B1C30649721510CFF470B14487B2E5D20AFC278A1F02 FF
<-120004AB0090002D
100 Ms.
#Petición de ESTADO del CAM
->214008A0CA000002C00006C7
<-124008B0040001000090007F

Code:
1F2E8997A9826CF4241F44446CAC1B83819950270ED877732B 5BD8E9B7C6B9C14730D0D2D2B4B1C875B09DDD0B59F6BA23F8 430F8B1F524756F3D051E50E7E42