A couple of months ago I’ve bought a LED Television: the Samsung UE46B7000 a 46″ LED TV from Samsung, with full networking, yahoo internet widgets, media center and so on. Yesterday I received for my (late) birthday a HDD Mediacenter Box (the dane-elec so smart, click here for specs). The box come with a NDAS (more info here) technology used to dinamically connect a storage (the HDD box. Using Dane Elec So Smart Firmware crack, password, registration. Dane Elec So Smart Firmware Update. Liens vers le site de Dane-Elec Page d'accueil (www.dane-elec.fr). 06/11/10 PhotoMate 6 in 1. Free Shipping On All Orders $35+. Shop Dane Elec at Target. Dane-Elec So Smart PVR - Wireless Multimedia Hard Disk Player & Video Recorder 1TB.
I recently bought gadget at walmart called the Dane-Elec Media Streamerthat I had been eyeing for some time. It is a small battery powerd portable wifistreaming device about the size of my tp-link mr3020. After playing around withit I feel that it has potential but the android for it is in beta (i think) andleaves alot to be desired. My first complaint is that the only supported formatfor upload is photos and it has to be from the camera app, you can't even uploada picture from the gallery, and only one at a time.So I did some searching to see if the device has any support from the hackercommunity, but there is none as far as I can tell. So I did some more searchingand I found that the device looks to be a clone of device made by Gigastonecalled the Smartbox.
Now the Smartbox also has an but it looks like it hasmore features. I already tried the smartbox app to see if it works with themedia streamer but it doesn't.Some how I stumbled upon page and found lots of info about the device. Internally, the box runs Linux on a Qualcomm Atheros AR9331 (pdf) processor, a Gigastone rep informed us.This part no longer appears to be supported by Qualcomm as one of its 12 XSPAN AR9xxx processors.The AR9331 offers a single MIPS 24k core clocked at 400MHz, and is typically paired with the WiFi-orientedLinux. The device also has 128MB DDR RAM and 32MB SPI flash, says Gigastone.So I can't tell if it runs openwrt or not but if it does then maybe it can be hackedto add ftp server support by adding some packages. My goal would be to add an ftpserver feature and just use to manage uploading files to the devicefrom my phone. That way I could do batch uploads/downloads and still stream offthe device. I already tried to see if I could connect to it using es file explorer butI can't.
Unless you can prove someone is using pirated software, don't accuse someone of using it. Linking to piracy-centric subs also prohibited. How to write music in garageband.
So any ideas? Posts: 3 Joined: January 23rd, 2014, 7:47 pm. I didn't like how the internet bridge light lit when not bridged (seemed odd). Even with latest versions of software same thing. So modifying the /var/www/netledset.sh file.Look for the following lines:Code: if '$STA' = 'on' ; thenINTERNETLED=$((INTERNETLED.4+1))elseINTERNETLED=$((INTERNETLED.4))fiand change toCode: if '$STA' = 'on' ; thenINTERNETLED=$((INTERNETLED.4))elseINTERNETLED=$((INTERNETLED.4+1))fiOf course this isn't permanent and rebooting the media streamer will wipe this out.
So I wanted it to be permanent. Well, I wasn't too careful and bricked it.but was able to bring it back. More details on a next post.This required connecting to the serial console which required popping open the case which was no easy task. I basically used a knife and cut along the seam around the top until i was able to get under the lid and pry the rest off.
No permanent damage, yay!Once I had it open I had to remove the 4 screws (2 silver and 2 black) and pull the main pcb off of the lid. On the top of the pcb is the CPU and described in a previous post. The hope was that there would be test points (TP) on the pcb that I could tap into for serial communication.After studying the CPU pinouts I found there are UART points for serial communication. One note the serial console is TTL and not RS232.
Google to see the difference.I had a TTL UART cable for Raspberry Pi and thought I'd give it a test run. I connected up the TX and RX to the test points and found a combination that gave me data when powering up the media streamer but the text was all garbled.
After thinking about it for a bit I realized that I'd not connected up a ground. Once that was connected at 115200 the console connection was working. (TestPoints.jpg)So with a little solder magic I was able to connect up a couple of wires for the console UART port (TestPointsConnected.jpg).I made the mistake of not securing the solder points and accidentally broke off TP3. I was able to get a solder point back on the line and hot glued it right away to secure. Attachments I was a bit anxious to do some work and didn't hot glue the solder points for support and accidentally broke TP3 of the PCB. A little trace back on the TP3 line and I was able to reconnect the wire.
I hot glued before I even tested to make sure it was working again. BrokenTP3.jpg (156.88 KiB) Viewed 33580 times This image shows the wires soldered onto the PCB at TP2, TP3 and a GND point.
This image shows where to solder the RX, TX and GND points for the TTL UART for serial communication with the CPU. Posts: 5 Joined: March 26th, 2014, 10:38 am. Here is a breakdown of the flash:Code: # cat /proc/mtddev: size erasesize namemtd0: 0000000 'u-boot'mtd1: 0000000 'u-boot-env'mtd2: 0000000 'CONF'mtd3: 0000000 'NVRAM'mtd4: 0010000 'uImage'mtd5: 0040000 'rootfs'mtd6: 0020000 'secfs'mtd7: 0000000 'ART'When I bricked it what I'd done was decided to make the internet bridge LED more useable (only light up when it has an internet connection as the default was just the opposite). To do this I needed to write it to flash somehow to make it more permanent.I stumbled upon the flashcp app on the device, part of busybox:Code: # flashcpBusyBox v1.22.0.git (2014-03-27 16:22:49 CST) multi-call binary.Usage: flashcp -v FILE MTDDEVICECopy an image to MTD device-v VerboseHmm, should be able to write specific parts of the flash partitions. Binwalk broke down the firmware update files for me and I was able to pull out the secfs part (/dev/mtd6) which I found (can't remember how) had the /tmp/www portion of the file system on it.binwalk automatically gunzipped the file and so after peeling this out of the firmware I was able to untar it out and modify the netledset.sh file.Knowing that the file was tar/gzipped I decided to do that in one stepCode: tar -zcvf www.tar.gz wwwThat command tarred and gzipped the www directory right into the www.tar.gz file. I then ftp'd it to the media streamer and was ready to flash it to the mtd6 partition in flash.Code: flashcp -v www.tar.gz /dev/mtd6and off it went. Cool!After a reboot though the device didn't come back up.not cool!This prompted the console port work.Well, once I got console I found that the file I'd saved to flash was corrupted or at least the expanding process on bootup was not successful.Now that I had console access I had more room to play.
I first challenge was getting wireless access back to it. After loading parts of the httpd.sh file to get drivers loaded, messing with an old dd-wrt router and working with iwconfig I was able to get simple access enough to ftp in. Whew, that part was done. Now to figure out what happened with the flash file.After a little trial and error I found that I could not tar and gzip the file all in the same process.
Perhaps the version of tar I was using was broken. Anyway I separated the steps;Code: tar -cvf www.tar wwwand thenCode: gzip www.tarand ended up with a file that I was successfully able to flash to the device and boot with my preferred modifications. Posts: 5 Joined: March 26th, 2014, 10:38 am.
When Kaspersky Lab revealed last week that it had designed to plant malicious code inside the firmware of computers, it should have surprised no one.And that's not just because documents leaked by Edward Snowden have shown that spy agencies like the NSA have an intense interest in hacking the firmware of systems, but also because other researchers have shown in the past how insecure firmware—in nearly all systems—is.Computers contain a lot of firmware, all of which is potentially vulnerable to hacking—everything from USB keyboards and web cams to graphics and sound cards. Even computer batteries have firmware.' There’s firmware everywhere in your computer, and all of it is risky,' says security researcher Karsten Nohl, who demonstrated last year how he could embed malicious code in the firmware of USB sticks. There's also firmware in all of our popular digital gadgets—smartphones and smart TVs, digital cameras, and music players. Although random hackers wouldn't be able to pull off what the Equation Group did in a consistent and stable manner—developing a single module that can reflash the firmware on more than a dozen different hard drive brands and steal data from them without crashing systems—other forms of firmware hacking have been successfully demonstrated.There has been a lot of theoretical research done on firmware hacking over the years and a few proof-of-concept demonstrations as well.
In 2011, security researcher Charlie Miller found that chips in Apple laptop lithium ion batteries were, allowing anyone who discovered the password and learned how to manipulate the firmware to potentially install malware that infects the computer and gives a hacker a persistent hold on it even after the operating system is reinstalled. To demonstrate the firmware vulnerability, he altered the firmware of Apple laptop batteries to trick them into reporting a low charge that would cause the charger to overcharge them until they were bricked. The USB research of Nohl and Jakob Lell showed how they could to hijack a computer, alter files or redirect a user's internet traffic to a malicious site.But not all gadgets and devices are equally vulnerable. One of the few companies that makes hacking its firmware difficult is Apple, which digitally signs firmware and firmware updates for the iPhone. But hackers don't need to alter the firmware to subvert the iPhone. Instead, says Costin Raiu, head of Kaspersky Lab's Global Research and Analysis Team, they could go after firmware in the baseband—the component that allows the phone to connect to cellular networks.'
Van halen best of cd. ^ I assume you mean the 24/192 versions since the 24/96 ones are just as compressed as the 2015 CDs?I have all of the original US CDs except for Women and Children First and Fair Warning. For those 2, I have the 2001 remasters.
If you want to put something deeply hidden into the iPhone you can put it in the the baseband,' he says, 'though this isn't easy to do.' In 2011, researcher Ralf-Philipp Weinmann did just this after finding security vulnerabilities in the firmware of mobile phone chipsets produced by Qualcomm and Infineon Technologies. Weinmann showed how he could to hack an iPhone and an Android phone and turn them into remote listening devices. The hack wasn't easy, however. Weinmann had to set up a fake cell tower and get the target phones to connect to it in order to deliver his malicious code. CountermeasuresSo what can you do about these firmware security issues? Unfortunately, there's very little.
Antivirus products currently don't scan a computer's firmware for malicious code and doing so is not a simple task. So countermeasures for the firmware insecurities are largely in the hands of hardware and chip makers.Hardware makers should design any firmware or firmware update they distribute to be cryptographically signed.
They should also add authentication capability to hardware devices so they can check and verify those signatures. Another protective measure would be to add a write-protect switch on the device side to prevent anyone who is unauthorized from flashing the firmware. An additional countermeasure, says Raiu, would be for hardware vendors to give user's the ability to easily read their machine's firmware and establish if it has changed since installation.If vendors provided a checksum of the firmware and firmware updates they distribute, users could periodically check it to see if it differed from the original. A checksum is a cryptographic representation of data that is created by running the data through an algorithm to produce a unique identifier composed of letters and numbers. Each checksum is supposed to be unique so that if anything changes in the dataset, it will produce a different checksum.