Skip to content

Instantly share code, notes, and snippets.

@dogtopus

dogtopus/ds5.txt Secret

Created November 1, 2020 19:29
Show Gist options
  • Save dogtopus/d527a5f118a5ad14be7e473d932742bc to your computer and use it in GitHub Desktop.
Save dogtopus/d527a5f118a5ad14be7e473d932742bc to your computer and use it in GitHub Desktop.
ds5 auth failing bad
$ sudo ./ds4poke.py -d 054c:0ce6 -v
nonce = 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
page = 0 data = 6728a13e7c5a4f62124d7198767d70caa9c242201a4cce08dd27ae6a0176f3481140283caa8ec78f77c37082087398d04279177b2bc06a4c
crc = 3649128814
<= SET 0xf0 payload=f00100006728a13e7c5a4f62124d7198767d70caa9c242201a4cce08dd27ae6a0176f3481140283caa8ec78f77c37082087398d04279177b2bc06a4c6e4981d9
sleeping
page = 1 data = 8007936e38ac3f6612359d507d727e3f504a887ae34fa686e1e4851b8b05c947320e3815039e427155ba2377875dd1041f88b00ef2bde03f
crc = 4137257889
<= SET 0xf0 payload=f00101008007936e38ac3f6612359d507d727e3f504a887ae34fa686e1e4851b8b05c947320e3815039e427155ba2377875dd1041f88b00ef2bde03fa18b99f6
sleeping
page = 2 data = 3cefb33ff4a71cdba8a63bb4d8daf76b1d90eddebf15792ca8ec1acb5d16a8f2882eb06587309b2f2c237eafc41024baec76c979807e2347
crc = 574081521
<= SET 0xf0 payload=f00102003cefb33ff4a71cdba8a63bb4d8daf76b1d90eddebf15792ca8ec1acb5d16a8f2882eb06587309b2f2c237eafc41024baec76c979807e2347f1c93722
sleeping
page = 3 data = a0be29e0867279d973219a822b280306d660810164be64b2db6c38d21242db68851cf0221f0b35e416294a15549c1db669dba8d815d3002f
crc = 2805857232
<= SET 0xf0 payload=f0010300a0be29e0867279d973219a822b280306d660810164be64b2db6c38d21242db68851cf0221f0b35e416294a15549c1db669dba8d815d3002fd0fb3da7
sleeping
page = 4 data = 532ae4ab89ecc85a88c5ae6df588ef93aa037e4b66a60d531af179c5b051201e000000000000000000000000000000000000000000000000
crc = 769904616
<= SET 0xf0 payload=f0010400532ae4ab89ecc85a88c5ae6df588ef93aa037e4b66a60d531af179c5b051201e000000000000000000000000000000000000000000000000e8cfe32d
sleeping
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
<= GET 0xf2 len=16
=> GET 0xf2 payload=f2000410000000000000000000000000
seq = 0 status = 4
crc = 0
crc mismatch
oops
timeout waiting for ok
auth ok
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010401000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010403000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010401000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010403000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010401000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010403000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010401000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010403000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010401000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
<= GET 0xf1 len=64
=> GET 0xf1 payload=f1010402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
seq = 1 page = 4
crc = 0
crc mismatch
data = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
resp = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
serial = 00000000000000000000000000000000
Traceback (most recent call last):
File "./ds4poke.py", line 262, in <module>
cuk = RSA.construct((bytes_to_long(bytes(resp_check.identity.modulus)), bytes_to_long(bytes(resp_check.identity.exponent))))
File "/usr/lib/python3.8/site-packages/Crypto/PublicKey/RSA.py", line 579, in construct
raise ValueError("Invalid RSA public exponent")
ValueError: Invalid RSA public exponent
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment