Register
Page 4 of 62 FirstFirst 1234567891454 ... LastLast
Results 46 to 60 of 929
  1. #46
    DK Veteran

    Join Date
    Feb 2013
    Location
    UK Bristol
    Posts
    459
    Thanks Thanks Given 
    68
    Thanks Thanks Received 
    96
    Thanked in
    65 Posts

    Default

    Thanks a lot.for all.


    If someone still dont know how this is use... one the forum mhhauto.com is user Kitnoos2002. He can make image under you sd card ID but he charge 20 or 30euro peer image.
    Last edited by pocinas; 25th January, 2019 at 02:17 PM.
    My post helps you? Please Hit Buttons

  2. #47
    Top Poster

    Join Date
    Oct 2011
    Location
    Germany
    Posts
    147
    Thanks Thanks Given 
    67
    Thanks Thanks Received 
    645
    Thanked in
    87 Posts

    Default

    Quote Originally Posted by pocinas View Post
    Thanks a lot.for all.


    If someone still dont know how this is use... one the forum mhhauto.com is user Kitnoos2002. He can make image under you sd card ID but he charge 20 or 30euro peer image.
    Then I will probably always remain poor.
    I spent many hours figuring out the encryption and did not really want to do anything else like reading my Opel 1.6cdti ECU.
    But I also see that many people publish my work in other forums, I hope they all do it for free

  3. The Following 3 Users Say Thank You to bergbahn For This Useful Post:

    hany50 (28th November, 2019), mexanico1971 (11th February, 2019), niboelectronic (18th March, 2019)

  4. #48
    Newbie
    Join Date
    Jan 2019
    Posts
    1
    Thanks Thanks Given 
    0
    Thanks Thanks Received 
    0
    Thanked in
    0 Posts

    Default

    Thx Master, i will try to fix my kess SDCARD, i hope all can be fix now.

  5. #49
    Member
    Join Date
    Jan 2019
    Posts
    76
    Thanks Thanks Given 
    18
    Thanks Thanks Received 
    1
    Thanked in
    1 Post

    Default

    Will try this

  6. #50
    Newbie forever85's Avatar
    Join Date
    Jan 2019
    Location
    Italy
    Posts
    16
    Thanks Thanks Given 
    1
    Thanks Thanks Received 
    7
    Thanked in
    5 Posts

    Default

    Do you think that the kitnoos user has copied your work? it does not do for free

  7. #51
    Top Poster

    Join Date
    Oct 2011
    Location
    Germany
    Posts
    147
    Thanks Thanks Given 
    67
    Thanks Thanks Received 
    645
    Thanked in
    87 Posts

    Default

    Quote Originally Posted by forever85 View Post
    Do you think that the kitnoos user has copied your work? it does not do for free

    By no means did "kitnoos2002" copy anything of mine, he had been successful much earlier with Kess SD cards.
    And as far as I know he only needs the SD card CID to create a new image.
    I still do not know how to convert the CID to the 13-line KEY.

    But my method works, so I do not have to know everything about it !

    I'd much rather find out how to decrypt the 5.017 and 5.028 protocol files.
    Last edited by bergbahn; 26th January, 2019 at 10:39 AM.

  8. #52
    Newbie forever85's Avatar
    Join Date
    Jan 2019
    Location
    Italy
    Posts
    16
    Thanks Thanks Given 
    1
    Thanks Thanks Received 
    7
    Thanked in
    5 Posts

    Default

    Exactly I know KITNOOS and it's a real professional. Unfortunately, not everyone is willing to explain their techniques for free and they are rightly charged. You will have yours and nobody denies the fact that it works ...
    Chip tuning professional.
    Winols original 4.30.
    File processing, DTC, DPF and EGR off.
    PCB Kess 5028, Ktag 8000.
    Optimized SD Card files for any SD card CID

  9. The Following User Says Thank You to forever85 For This Useful Post:

    kitnoos2002 (28th January, 2019)

  10. #53
    Top Poster

    Join Date
    Oct 2011
    Location
    Germany
    Posts
    147
    Thanks Thanks Given 
    67
    Thanks Thanks Received 
    645
    Thanked in
    87 Posts

    Default

    we do not want to discuss other members here !!!

    all members who publish here have certainly invested a lot of free time.
    We should rather thank these people.

    And now please only contributions to the topic.


    And a message to all who use my work, it is no shame to press the Thanks button
    Last edited by bergbahn; 26th January, 2019 at 11:00 AM.

  11. The Following 8 Users Say Thank You to bergbahn For This Useful Post:

    carmansk (15th March, 2020), jsdias (28th February, 2019), peter1977 (28th January, 2019), pocinas (28th January, 2019), rybenz (29th January, 2020), SergeyIg (7th March, 2019), vasiliev7719 (6th March, 2019)

  12. #54
    DK Veteran

    Join Date
    Jun 2013
    Location
    EU
    Posts
    4,137
    Thanks Thanks Given 
    1,339
    Thanks Thanks Received 
    2,642
    Thanked in
    1,528 Posts

    Default

    Haven't talked personally with kitnoos2002 (the only pm i sent him about this topic was unanswered, maybe he thought i was trying to learn something from him while i already knew all this since day 1 ktag 6.070 arrived on the scene, was first clone in implement this sd cyphering) but i think he uses same way as you to produce his custom cid images.

    My guess is he use a cid changeable card, put on it the requested cid and extract the key in a similar procedure as you, triggering the same bug in the firmware you use on the interface to initialize the new card and grab fron there the encryption key. Then apply the encryption on a ready made clean image.

    This method i haven't tested myself cause i don't own a cid changeable card, but knowing how all thing works i'm sure its a workable way to produce custom cid images too.

    There is another way to self produce workable image for personal use, no any technical or encryption or programming knowledge needed. I may publish it some day.

    As for the cid to key conversion i will keep it for myself a bit more. with your permission.

    Anyway in all that speech i wrote are some clues that can make you go forward in guessing the cid to key thing.

    Regards

  13. The Following 5 Users Say Thank You to morgano For This Useful Post:

    bergbahn (26th January, 2019), Jonas225 (28th January, 2019), Jose Santana (22nd April, 2019), Jupiter199 (27th January, 2019), peter1977 (28th January, 2019)

  14. #55
    Junior Member
    kitnoos2002's Avatar
    Join Date
    Sep 2015
    Posts
    38
    Thanks Thanks Given 
    64
    Thanks Thanks Received 
    87
    Thanked in
    12 Posts

    Default

    Quote Originally Posted by morgano View Post
    Haven't talked personally with kitnoos2002 (the only pm i sent him about this topic was unanswered, maybe he thought i was trying to learn something from him while i already knew all this since day 1 ktag 6.070 arrived on the scene, was first clone in implement this sd cyphering) but i think he uses same way as you to produce his custom cid images.

    My guess is he use a cid changeable card, put on it the requested cid and extract the key in a similar procedure as you, triggering the same bug in the firmware you use on the interface to initialize the new card and grab fron there the encryption key. Then apply the encryption on a ready made clean image.

    This method i haven't tested myself cause i don't own a cid changeable card, but knowing how all thing works i'm sure its a workable way to produce custom cid images too.

    There is another way to self produce workable image for personal use, no any technical or encryption or programming knowledge needed. I may publish it some day.

    As for the cid to key conversion i will keep it for myself a bit more. with your permission.

    Anyway in all that speech i wrote are some clues that can make you go forward in guessing the cid to key thing.

    Regards

    Hello,
    Sorry Morgano I get a lot of messages, I probably missed yours, please do not hesitate to send it back to me.

    You're wrong, I have several Samsung SD cards with programmable CID but I do not need it. I do not need Kess / Ktag either.
    I coded my own program to generate SD card images from the CID.

    I am interested to work with you all to decrypt the protocols in GEN_FILE format (Kess / New Genius) and in LDR_FILE format (Ktag / Trasdata).
    They are encrypted with the Kess / Ktag serial number.


    And for you bergbahn, if your ECU is a Delco E98, it appear in Ksuite 2.32.
    So you need Kess 5.028 firmware working with Ksuite 2.34 or better 2.47.

    If you want to work with 5.017 it will be difficult to port protocol from 5.028 to 5.017 because protocols use external functions from firmware.
    Depending on firmware, function are located at different addresses.
    To port protocols to different firmware, call addresses should be changed inside and also functions in firmware should be available and same.

  15. The Following 4 Users Say Thank You to kitnoos2002 For This Useful Post:

    bergbahn (28th January, 2019), jockyw2001 (13th August, 2022), Jonas225 (28th January, 2019), toms4 (8th September, 2019)

  16. #56
    Top Poster

    Join Date
    Oct 2011
    Location
    Germany
    Posts
    147
    Thanks Thanks Given 
    67
    Thanks Thanks Received 
    645
    Thanked in
    87 Posts

    Default

    Quote Originally Posted by kitnoos2002 View Post
    Hello,
    Sorry Morgano I get a lot of messages, I probably missed yours, please do not hesitate to send it back to me.

    You're wrong, I have several Samsung SD cards with programmable CID but I do not need it. I do not need Kess / Ktag either.
    I coded my own program to generate SD card images from the CID.

    I am interested to work with you all to decrypt the protocols in GEN_FILE format (Kess / New Genius) and in LDR_FILE format (Ktag / Trasdata).
    They are encrypted with the Kess / Ktag serial number.


    And for you bergbahn, if your ECU is a Delco E98, it appear in Ksuite 2.32.
    So you need Kess 5.028 firmware working with Ksuite 2.34 or better 2.47.

    If you want to work with 5.017 it will be difficult to port protocol from 5.028 to 5.017 because protocols use external functions from firmware.
    Depending on firmware, function are located at different addresses.
    To port protocols to different firmware, call addresses should be changed inside and also functions in firmware should be available and same.
    Hello, I'm also interested in decrypting the protocols in GEN FILE format.
    Unfortunately I have not achieved anything yet.
    In the database of Kess 2.47 the E98 ECU is inside, the line is just not active.
    Attached Images Attached Images

  17. #57
    Junior Member
    kitnoos2002's Avatar
    Join Date
    Sep 2015
    Posts
    38
    Thanks Thanks Given 
    64
    Thanks Thanks Received 
    87
    Thanked in
    12 Posts

    Default

    Yes, protocol 568 is opened in Ksuite 2.47 with Kess firmware 5.028 :



  18. #58
    Newbie
    Join Date
    Dec 2017
    Posts
    3
    Thanks Thanks Given 
    3
    Thanks Thanks Received 
    0
    Thanked in
    0 Posts

    Default

    Thank you very much. It works.

  19. #59
    Top Poster +
    alektkac's Avatar
    Join Date
    Mar 2016
    Location
    Украина
    Posts
    211
    Thanks Thanks Given 
    47
    Thanks Thanks Received 
    114
    Thanked in
    68 Posts

    Default

    . Where canet the firmware
    Last edited by alektkac; 31st January, 2019 at 06:43 PM.

  20. #60
    Top Poster +
    alektkac's Avatar
    Join Date
    Mar 2016
    Location
    Украина
    Posts
    211
    Thanks Thanks Given 
    47
    Thanks Thanks Received 
    114
    Thanked in
    68 Posts

    Default

    Hello.Where can i get the firmware Kess 2.028 ?

 

 
Page 4 of 62 FirstFirst 1234567891454 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
This website uses cookies
We use cookies to store session information to facilitate remembering your login information, to allow you to save website preferences, to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.