PDA

View Full Version : CCcam backdoor rumours



zaf786
14th November, 2010, 08:52 PM
Hi here is a possible serious issue arising with cccam reported on certain forums plese read i have copied this of a certain forum it translated into english and original german text


As some of you have noticed certainly support the CCcam is asleep. Since the beginning of this year, there were no new versions and more are coming, probably no more.
Much more than the programmers a new business idea, which makes them ordendlich pockets full.

All CCcam versions of version 1.6.1 have a backdoor, which allows the server port to poll data.
We obtain for example CCcam.cfg and the data of the local maps, without which one is enabled in the config. Also available to anyone who knows the IP and port.
The programmers have written for a tool that looks for specifying a dynamic IP or DNS address and the correct server listening port, a serial number of smart cards.
delivered after the server has the data, the CCcam.cfg the server is searched for additional addresses and these are stripped of their card serial numbers.
The results can be on screen with track and write to a file.
Sun serial number, IP and date are recorded with time.

For those who are wondering what the **** is, the well is clear that hereby can earn a lot of money.
The programmers provide the tool PayTV providers and providers of encryption systems to buy, so that they can actively seek Cardsharern who share their cards over the Internet without permission.

It is clear that this tool has already found buyers. Confirmed is that LOL

Hurrah again but thread on Zebradem. silver surfer you have written but I am well impressed. If so I'll send you out my DNSort by PM / M and you give me things my
Serial
Listen
Read phonetically
Dictionary - View detailed dictionary


Wie ihr ja sicherlich gemerkt habt, ist der Support der CCcam eingeschlafen. Seit Anfang dieses Jahres gab es keine neuen Versionen mehr und es werden wohl auch keine mehr kommen.
Viel mehr haben die Programmierer eine neue Gesch?ftsidee, welche ihnen ordendlich die Taschen voll macht.

Alle CCcam Versionen ab version 1.6.1 besitzen eine Backdoor, welche es erlaubt, ?ber den Serverport, Daten abzufragen.
So erh?lt man z.b. die CCcam.cfg und auch Daten der lokalen Karten, ohne das man in der Config freigegeben ist. Also f?r jeden zug?nglich, der IP und Port kennt.
Die Programmierer haben daf?r ein Tool geschrieben, welches unter Angabe einer IP oder dynamischen DNS Adresse und des richtigen Server Listening Ports, nach Seriennummern von Smartcards sucht.
Nach dem der Server die Daten geliefert hat, wird die CCcam.cfg des Servers nach weiteren Adressen durchsucht und auch diese werden ihrer Kartenseriennummern beraubt.
Die Ergebnisse lassen sich auf dem Bildschirm mit verfolgen und in eine Datei schreiben.
So werden Seriennummer, IP und Datum mit Uhrzeit erfasst.

Wer sich jetzt fragt, was der Schei? soll, dem wird wohl schnell klar, dass sich hiermit eine menge Geld verdienen l?sst.
Die Programmierer bieten das Tool PayTV Providern und Anbietern von Verschl?sselungssystemen zum Kauf an, so dass diese aktiv nach Cardsharern suchen k?nnen, die unerlaubt ihre Karten ?bers Internet teilen.

Es steht fest, das dieses Tool schon K?ufer gefunden hat. Best?tigt ist, dass LOL

Hurra wieder son Thread auf Zebradem. SilverSurfer hast du aber gut geschrieben bin beindruckt. Wenn das so ist schick ich dir mal meine DNSort per PN/M und du sachst mir meine
Serial

opsmonkey
14th November, 2010, 09:03 PM
sounds like a bag of bollox to me.. CCcam 1.6.1 came out on 27 Jan 2007.. I very much doubt something like this would have been kept quiet for nearly 4 years..

Probably a bored user wondering how many times his post would be cut and pasted across the sat forums..

Wheres the evidence..??

zaf786
14th November, 2010, 09:09 PM
sounds like a bag of bollox to me.. CCcam 1.6.1 came out on 27 Jan 2007.. I very much doubt something like this would have been kept quiet for nearly 4 years..

Probably a bored user wondering how many times his post would be cut and pasted across the sat forums..

Wheres the evidence..??
we will wait and see what develops out of this i would not rubbish this some credible people have seen this software work

Mjolinor
14th November, 2010, 09:12 PM
I concur, it's open source anyway isn't so if this is right it would be easy to find.

zaf786
14th November, 2010, 09:28 PM
I concur, it's open source anyway isn't so if this is right it would be easy to find.
I think cccam source code is not public 100% only 70% is public also rumours are cccam 2.1.4 is not work of cccam team it,s was released by some unknown team

satsmo
14th November, 2010, 09:40 PM
I have spoken to others when 2.14 was released and that was the general consensus, however still a rumour unless hard facts are posted.

I will however say that 2.14 was looked at and certain command lines exhibiting some form of data interception but encrypted so no more info after that point.

There are plenty of Cams out there that do the same if not a better job than CCcam. I use 2.13 from time to time with no issue but try many.

dctyper
14th November, 2010, 10:07 PM
this is a comirmed roumer, no facts or evidence

end of

satsmo
14th November, 2010, 10:25 PM
I understand commands but whats a "comirmed roumer" :)

I also know its a rumour but so are a lot of things have you looked at the source? I have a long standing bet going on with another Cam dev team and they are still trying to convince me since the release of 2.14.

Jahu
14th November, 2010, 10:53 PM
I have a Linux server with CCCam 2.1.4 and it's totally firewalled on all ports apart from local ones. There is no chance the cccam is sending any info anywhere else as I would definitely see port connection triggered to make outside connections. This has never happened since 2.0.11 that i use.

Sure since the source is closed people can have their fantasies.

Mjolinor
14th November, 2010, 11:32 PM
I have a Linux server with CCCam 2.1.4 and it's totally firewalled on all ports apart from local ones. There is no chance the cccam is sending any info anywhere else as I would definitely see port connection triggered to make outside connections. This has never happened since 2.0.11 that i use.

Sure since the source is closed people can have their fantasies.

It is not firewalled on the port it uses and certainly access over that port is possible or it wouldn't work at all. Undocumented commands for accessing other things over that port are certainly possible though in my opinion not too likely or useful even if they were there.

deffc0n
15th November, 2010, 11:33 PM
Video CCcam backdoor serials cards and ip users.