[Rafael Scheel] a security consultant has found that hacking smart TVs takes nothing much more than an inexpensive DVB-T transmitter, The transmitter has to be in range of the target TV and some malicious signals. The hack works by exploiting hybrid broadcast broadband TV signals and widely known about bugs in web browsers commonly run on smart TVs, which seem run in the background almost all the time.
Scheel was commissioned by Cyber security company Oneconsult, to create the exploit which once deployed, gave full root privileges enabling the attacker to setup and SSH into the TV taking complete control of the device from anywhere in the world. Once exploited the rogue code is even unaffected by device reboots and factory resets.
Once a hacker has control over the TV of an end user, he can harm the user in a variety of ways, Among many others, the TV could be used to attack further devices in the home network or to spy on the user with the TV’s camera and microphone. – Rafael Scheel
Smart TV’s seem to be suffering from IoT security problems. Turning your TV into an all-seeing, all-hearing surveillance device reporting back to it’s master is straight out of 1984.
A video of a talk about the exploit along with all the details is embedded below.
Continue reading “Remotely Get Root On Most Smart TVs With Radio Signals”
Image from [psouza4] on the xda-developers forum
Chromecast is as close as you’re going to get to a perfect device – plug it in the back of your TV, and instantly you have Netflix, Hulu, Pandora, and a web browser on the largest display in your house. It’s a much simpler device than a Raspi running XBMC, and we’ve already seen a few Chromecast hacks that stream videos from a phone and rickroll everyone around you.
Now the Chromecast has been rooted, allowing anyone to change the DNS settings (Netflix and Hulu users that want to watch content not available in their country rejoice), and loading custom apps for the Chromecast.
The process of rooting the Chromecast should be fairly simple for the regular readers of Hackaday. It requires a Teensy 2 or 2++ dev board, a USB OTG cable, and a USB flash drive. Plug the Teensy into the Chromecast and wait a minute. Remove the Teensy, plug in the USB flash drive, and wait several more minutes. Success is you, and your Chromecast is now rooted.
Member of Team-Eureka [riptidewave93] has put up a demo video of rooting a new in box Chromecast in just a few minutes. You can check that out below.
Continue reading “Chromecast Is Root”
Cries of “I am root!” abound once again with the rooting of Sony’s PRS-T1 eBook reader. The eBook Reader Blog took the original rooting directions and then looked at some of the things you can do with root access.
This hardware is based around an ePaper display, but we must say that the performance seems to be fantastic. There may be a few missing features from the original user interface (like how pages are turned) that can be fixed with root access, but we think it’s the added Android access that makes this worth it. In the video after the break you’ll see that you can drop through to the Android 2.2 desktop and install any application you’re interested in using. This is a multi-touch display so it’s well suited for navigation although applications don’t work well yet because of excessive screen refreshing. But we’re sure that will improve with time. Of note is the ability to play music through apps like Pandora, and the ability to load content from other providers like Amazon books via the Kindle app.
Every time we write one of these rooted features we can’t help but think back to this I’m a Mac spoof video…. you’ll see why in the last few seconds.
Continue reading “Rooting Sony PRS-T1 Lets You Get At The Android Goodies”
The Alex eReader has been rooted. This little handheld was the belle of the ball at CES 2010 when it came to eReaders. Now that is has been released into the wild it takes its place next to the heavy hitters that have already seen root access. If you’re unfamiliar, this device boasts a six-inch e-ink display and a 320×240 LCD touchscreen interface. Now that you can make it do your bidding, what are your plans for the $350 tablet? Let us know in the comments.
You know it’s getting a bit ridiculous when hardware that hasn’t hit the streets is being rooted. That’s exactly what has happened, root access can now be achieved on the Nexus One. [Paul] found an exploit and packaged it nicely so that anyone can do it. We do wish he had shared the details of the exploit but we’re not complaining.
If you’re not in the know, the Nexus One is the fabled Google Phone now come to life. It’s slated for release in 2010 and some think that will be officially unveiled at a January 5th press conference. That’s right, unveiled. The device has been cracked yet it doesn’t officially exist. What it does do is join a growing number of rooted android phones.
Droid has been rooted. It was only a matter of time but we do like to celebrate this sort of thing. Why? Because if you pay for it you should own it. This will probably spark a flame war about licensing agreements and such in the comments but answer this: if it breaks, who pays to fix it? If you’re the one paying for it, you should be able to do what you want with it.
The process seems simple. Copy the magic file onto your SD card and go through the firmware upgrade process. Just make sure you know what you’re doing so that you don’t brick this sexy device.