
DEF CON 22 – Felix Leder – NinjaTV
لدينا أنظمة آلية للعملاء ، من أجل إنشاء حساب تقييم وفواتير ، يمكن للعملاء التجديد عن طريق الدفع عبر الإنترنت على الموقع الإلكتروني. - لدينا أكثر من 9000 قناة HD و ...
so our future converse is gonna be Tremendous amazing on the lookout ahead to this and we've got An additional Are living demo we are gonna find out about how to mess along with your Clever Television set procedure and I'm guessing probably enable it to be do things which it was not intended to initially is that proper that's great outstanding properly with any luck , it does anything that it absolutely was supposed for currently ideal yeah all proper all right prepared to go all correct very well let us give a large major occasion observe welcome to Felix and let us get this detail begun all right um can it be on are we nonetheless gotta receive the movie create up mainly because I want to demonstrate live how to use the procedure and the like so I introduced a box but we must swap to some video projector between so we remain working on it all right lit up here we go all right there's no seem commences incredibly perfectly This can be how my Tale commences who basically is aware of what it can be sorry that may be Tata that is a German Television series It really is a crime sequence It truly is almost as outdated as Columbo the only real change is that they are still manufacturing exhibits and It is continue to functioning so when some German family members it is a custom that after the weekend is above on Sunday night quarter earlier eight you sit down you switch on the very first Television set channel that was ever there and that is continue to there and you also viewed the show new episode and since it's a custom It is also something that my spouse and I like to do and we moved to another country a couple of years back and unfortunately we ended up unable to see this clearly show any more and It can be kind of sad and that is the start on the story so where my my title is Felix Lida and my enthusiasm is usually to acquire factors aside and also to place other items with each other that support to take points aside besides that I'd like to be out while in the snow or from the drinking water and to explain you a bit far more what I mean by taking items apart I choose to hunt bugs and malware and collect them I also like to analysis associate takeovers and countermeasures and i am closely linked to the unaired project through my working day work I function all-around cellular menace analysis at a very pleasant company called Blue Coat but this research I'm presenting is don't just my own do the job you understand just about every study has some supporters and In this instance It really is a bunch of people from corporation named enzymes and so they assisted me using this type of so the background with the Tale is usually that we had this box a Western Digital Television existence hub I even have just one on stage here and it's It really is an extremely great bit of components basing makes your dumb Television sensible and For those who have a smart Tv set you obtain much more services and much more prospects to accomplish stuff you see below as HDMI output there are also two USB ports it supports Wi-Fi then and device Television attach a keyboard and stuff similar to this but what is additional intriguing is as the moment it appears to be much more like an Apple Television or something similar to this What's more, it provides a 1 terabyte hard disk in there and that's sort of neat mainly because Then you can certainly upload all your flicks It really is all on one machine you don't want an extra storage like an ass or one thing to make sure that's pretty convenient the processor in There exists rather of slower to MIPS processor but It is also not answerable for actively playing the video essentially the codecs are all and hardware to the technique they usually Guantee that you'll be able to Enjoy the video clips fast enough back to your Tale so this box previously has all kinds of products and services on there which happen to be quite wonderful like YouTube and Spotify and things such as this and immediately after we did not have this Tv set demonstrate you're not tada laughter for a while my wife actually stated you recognize you happen to be usually breaking things The full time why Never you for the moment do something beneficial using this and put my favored display on this box and you know when your wife asks you something such as this you far better you should definitely please her in fact I hope my wife is just not right here simply because she would likely remark nicely what Did you know regarding how to remember to me properly which is a distinct Tale alright alright so let us start now in advance of we start we also are gonna launch the modifications that We've finished for the firmware so we want a disclaimer That is for educational or study reasons provided that you do what We've done below so you crack your box it isn't our fault and we will never have people today simply cannot assistance you also if you utilize any sort of DRM keys etc about the Box it's actually not our fault all right a lot for your disclaimer um initial step initially attempt was we did in offline in Assessment of the disk that is in there essentially taken it out plugging it into Laptop or computer see what's on there and it began pretty really lucky we observed A non-public partition on there but right after a few minutes we uncovered to choose from's actually almost nothing absolutely nothing of relevance on that partition just some offline storage for Spotify and hope htb and Other than that there's just the partition that holds all the data many of the videos that we add and swap so which was very little unfortunately bad try getting some pressure presently from my wife for losing time 2nd phase this box has an update system it quickly reaches out to Western Digital to examine if there's a new firmware and if there is it asks if you want to install it and it does all of that mechanically you can also download the firmware manually in case you go to their assist web page and see what is in the update so as soon as we down load all this we noticed that there is a zip file and while in the zip file We've 5 different other information and two that look like really exciting one particular is really a bin file and a person is named bi – they are one hundred fifty megabytes about and we want to check if we discover something that we can identify in there and fortune we did there is a squash FS filesystem in there nevertheless it's at offset 32 so I however will need a lot of people drinking with me tonight so you get a beer if you can solution what the initial 32 byte may very well be in the event you guess proper any Strategies what the primary 32 byte prior to the additional file process image our signature Excellent who stated it 1st all correct return later to me out bio bio beer perfect yeah it seems It really is an md5 signature of The full picture and so we began looking into this a little more intently how the photographs appear to be and really Everything you see is you might have two different pictures that compose The full working procedure around the device it is a Linux technique during which a person is the basis filesystem basically for everything from root downwards it's got an finish signature such as the size and in the quite commencing such as the gentleman just stated there is certainly the md5 of The complete image this md5 is then also appended to the 2nd image which is often mounted at /decide which once again has A further signature within the pretty front to be certain they all suit with each other and nothing's broken and those two alongside one another in essence make up the image now let's check into the material that is a tiny bit little bit smaller I know that so I am going to reveal it within the left aspect the thing is the principle image the foundation impression and it's got the standard init method which initializes The complete device it's got a config file with some static config and it's got One more file with md5sum d5s During this presentation looks like Western Digital likes md5 on the proper facet you will find the OP folder and there was just one attention-grabbing folder termed World-wide-web server which actually appeared pretty appealing so with this particular there was sufficient info to truly modify the box but we ended up a little bit hesitant about no matter if we must always just modify the firmware and upload a fresh a single for The main reason that we were not confident when they did not have far more md5 checks there and it looked like they had a lot so we were being a little hesitant to change the firmware and perhaps just split that solitary product that we experienced the opposite alternative was let us go hunt for many vulnerabilities could acquire more time but It is also extra fun suitable Alright so a vulnerability getting first thing was to consider the webserver um this matter provides a webserver allow me to also swiftly switch to the place We've Firefox here we have Firefox which is everyday living over the box now so you see that is the entry for those who once you log in you and the password is admin by the way when you log in you obtain a handheld remote control but You can even alter the password etc to ensure glance form of promising and Thankfully the PHP which is utilized to change every one of the configuration will not be encoded encrypted or just about anything It is really just they are in simple to ensure's always a great commence you are aware of starting from the world wide web server SQL injection which was the first endeavor and as you are able to see there's a really awesome SQL assertion at the bottom and that is composed of parameters right from the get requests like entry ID language ID fantastic and that is working with SQLite so Here is the assertion that could really generate an SQLite database that is concurrently an SQLite and a sound PHP file does any have any one listed here have expertise with the PDO databases driver someone about right here what is actually the situation Never see it PDO only will allow a single statement at a time and we wished to inject 5 statements listed here so regrettable failed to get the job done and even if it experienced labored we found out afterwards this A part of the file units actually read through only so no possibility whatsoever bummer ok past the webserver keep track of up coming issue to try was remote file inclusion and what we discovered is you will find an remote file inclusion or perhaps a file inclusion possibility based upon the language which is stored while in the cookie so allow me to switch again to the internet server and you will see you there You should enter a password and down in this article You will need to can decide on the language ok I've a cookie editor up listed here and if we refresh it you'll be able to see there is a language ID of three in in this article so we ended up thinking okay can we just modify this adding a few dots introducing a couple of slashes they press the correct button screens a tiny bit far-off yeah I did In order you may see now we get an error information expressing oh it did not find the file open up or PHP after which you can we thought alright um why not simply upload a file known as dwelling dot PHP into the folder that we are able to obtain by using SMB after which modify the cookie to position to that and actually can determine the path just by taking a look at the firmware okay I press the incorrect button sorry the cookie editor is actually tiny and it's tough to see the screen basically from below alright Wow good now we bought a PHP shell so Those people of you who've labored with PHP shells know that they are suffering inside the ass correct so the very first thing you ought to do is attempt to determine if you can find telling it on there and truly explain to it had been on there so we want to activate it and acquire on on the box and I have to confess my track record is generally not an excessive amount of the embedded products but a lot more such as Computer system entire world and usually whenever you own the world wide web server the next thing you do is think about privilege escalation all ideal so um exact issue below let us go and switch it to the box and in an effort to know like from which it count to him escaped or to have the privileges initially you figure out which account you might be Learn more and oh hey Now we have Ruud presently this was considerably a lot easier than I predicted but You can even see my stupidity about the screen for the reason that basically the PHP shell by now lets you know that you are route alright pleasant so this was just the beginning simply because we ended up in a position to get route but a lesson that I experienced to find out in the course of the experience is Really don't begin with SQL injection Really don't get started with a distant file inclusion Never get started with SQLite privilege a privilege escalation stuff similar to this search for the actually very low hanging fruits so investigating the graphic label even further I found that really the blokes from Western Digital had put up a symlink with the Website services root directory suitable on the disk so it was not even needed to upload or to test to use the process and i am not fairly sure if they have just neglected it or whether or not they desired to make it very simple for men and women for the reason that if I just say consumer keep or PHP and that is priya authentication no authentication at this point I also obtain the shell just in a special Listing ah which is wonderful so but I thought properly if It is that uncomplicated we most likely uncover far more stuff so hum For those who have seen the main talk this morning hacking 22 points in forty five minutes it had been an excellent discuss the fellows have taken a component the Google Tv set before and they went for UART so we tried the same we also experienced a look over the board and attempted to determine in which our pins or wherever our soloing details exactly where we may possibly include some pins and we uncovered that there are two pins that truly are candidates you see them both of those in the picture here and a small amount of measuring all around and things like this we found out which the one particular from the entrance which is closer into the chasis that is truly a standard u artwork which might be X there's tx2 ground and also a three.
three volt pin and here's the warning in order to Do that at home it is a three.
3 volts and also your Laptop is five volts you are able to burn up either your Personal computer you'll be able to burn off the box or you can melt away there one example is USB to UART converter I have burned 3 there was there was my lesson acquired of not getting low-cost things from Taiwan Just what exactly do you obtain When you attach a serial console so after you set up you have all sorts of information about the program in which the image is stored what else is in which configurations exactly what is presently loaded which drivers are loaded and actually If you have the technique up and running and see the display screen from the procedure and you push a button over the remote control or some thing it tells you exactly which button you happen to be pressed and which actions are taken in an effort to get there so this is ideal debugging great when it had been concluded umm the thing is anything like this I told you they like md5 so you see an md5 and you see login what's the password that's an opportunity for profitable One more beard tonight guy it's actually not that effortless it's actually not as simple as hacker as admin as OAM root or a thing these guys like md5 let's have a look sorry md5 50 % which at yeah It is really shut but it's not pretty It is a bit more innovative basically I talked to a different person a few minutes previously he mentioned really not less than I did another thing right but let us have a closer seem so um the shadow file that actually exists in TMP shadow and et Cie shadow is simply a connection to that and we located the hash in there and began to about the Ripper naturally mainly because we would like to understand what it can be but that doesn't didn't get us incredibly significantly immediately so we started investigating a bit nearer And that i instructed you the serial line is extremely valuable for debugging there was actually one line expressing password for root modified as you are able to see with the screenshot there also like other information and facts but like which modules are commenced in advance of which modules are started out and loaded soon after many stuff similar to this so this was genuinely practical to trace triage which module which method was basically liable for this there is a Instrument known as G bus go through serial variety and that is located in a folder that's not inside of the first firmware picture It is really basically an encrypted addition into the file procedure making use of AES encryption which is later quantity to employ a neighborhood s pin and right here you find some stability by obscurity as it's situated in slash house slash file and that's that contains lots of fascinating information and facts I have also set the data below the way you can actually extract the AES vital but I am not likely to go into the main points which is extra for reference so This is how it seems to be visually We have now in the home folder a file code file we contain the AES essential in ROM and Later on things is extracted to the folder or mounted right into a complete a user community s bin and We now have this system and there is also Yet another system in there that's 13 megabytes in size called DMA OSD since This really is an encrypted folder we previously considered this is probably quite interests point let us have a closer glimpse but let us get again to exactly what is the password so after We've the program we have been truly ready to reverse engineer The most cost effective beats arena and we found out It truly is undertaking a process contact some method function simply call not a method get in touch with the place the serial quantities made use of the md5 of that is really developed and it is the password how do you obtain the serial selection Use a consider the box yeah there's actually A simpler way Have got a think about the login display screen because the serial number is the md5 ideal before login I didn't deliver the serial cable or I actually introduced a co a cable but considering the fact that I blue screen my Home windows several occasions Together with the serial cable I don't want to test it out right here we can check out it out with Linux later because that actually works much better but I still desire to demo to you men how this basically appears like alright login This is the password would be the password prompt we wish to login as root we must duplicate and paste see but you realize so I am gonna variety it below so You do not see that display and It is really just calculating the md5 sum then over below pastes hey have One more ruler this was the password Incidentally all right you almost certainly know this by yourself at this stage in time you say Certainly suitable result in your root usually feels excellent being root Primarily on techniques that you choose to have not been ruled on before so that is the stage in time when my wife arrived bacon Seems superior are you presently done still and It really is halfway all right neck because next step was truly to find out wherever will be the apps Found and if you Go searching on the foundation filesystem or within the file technique generally you will discover many logos for your expert services and loads of hints and you find some DRM data files but You will also find some applications for which You simply locate the logos and nothing else one of them is Red Bull Pet TV AOL developed EE and several Other individuals so we was we were truly wanting to know in which would be the apps especially for those I understand we had a closer take a look at this process DMA o s D the on monitor Screen This is actually the final approach that commenced as Portion of the init course of action if this process dies the whole box immediately reboots there's a watchdog about it It truly is located in the encrypted partition that we were being referring to with AES just before and this solitary system makes use of up a hundred and fifty megabytes with the 200 out there about the box so it looks like this is an important piece and searching additional carefully into this process we truly discovered some tough-coded your else in there like by way of example HD aol.
com slash Western Electronic hdhd em plus some others ok and after you go to these Websites and now I have to check the resolution on the projector here let's drop by AOL It is really not easy to see on AOL let us Do this Russian framework this Russian web site so that is a Russian movie site and generally you can buy or down load stream video clips from there and That which you see is there's a white bar with the pretty base that is not Component of the design so if you go to those Websites along with your browser you see that they're particularly 1280 x 1024 pixels in dimension and that is what precisely the box is exhibiting in your TV so these internet pages are created specially to ensure that a browser on this equipment this box can obtain them and the thing is Anything you're imagined to see all right so that offers us some pointers some more information about this DMA OSD executable and wherever the browser is so It can be 30 megabytes and that's massive especially for embedded products It can be actually fairly huge presently for x86 but smaller and because of the unit like this can it be's huge and The rationale for this almost everything is joined in statically there is a QT centered World-wide-web browser in there there are libraries for HDMI for accessing the hardware codecs and there is a logic in there to automated USB sticks look for firmware mechanically sync by using a hard disk drive stuff such as this it controls the network shares there is certainly an update demon in there naturally the renderer for that on-display screen menus and it on get started loads all shots that it finds in certain certain folders over the disk all into memory so this is really a piece where you need to dig deeper in case you want to essentially modify the on display Screen and include for some new Television set stations What exactly the next action that we did so as to know more from the logic in there was to make a GDP server put around the box to ensure that we could connect a debugger within the box where it's jogging and after that Command this from A further device the data to the slide is just for your reference just in case you choose to consider it out to would be the computation alter the nice issue is if you're already reverse engineering The full detail plus a functioning Ida Professional Ida Professional contains a GDP stuff by now built-in and they aid MIPS so that you can in fact use Ida Professional right away to debug this method regrettably it breaks occasionally so Never Do not totally rely upon it this is really Expense several evenings alright truly at this time my spouse arrived again and looked about my shoulder stated you might be once again taking a look at assembly what's the standing the program is commencing before long I choose to see it I explained I'm generating progress but um Let's examine so now We all know there's a World wide web server within the box appropriate and there is 1 nice factor the broadcaster does question them they have a Stay stream they've got a Are living stream on-line and I would like to check out it naturally there isn't any tart or operating in the mean time Let's have a look at if we can actually obtain a Are living stream there simply because they block some information to other web sites now unfortunately not at this time I hoped that they are streaming not less than in information they are not about and we are going to nevertheless provide you with how the things will work so this time I was um focused on go for your very low hanging fruits you know In such cases the lower hanging fruits in fact go into the procedure look for about where by are definitely the URLs the difficult-coded URLs and maybe just capture a few to truly incorporate the favorite TV station that we wish to have okay switching back on the box so so 1206 is the process ID that we wish to patch 1206 and we wish to let us take by way of example the Pink Bull entry appletv entry and we redirected to in Germany all right so Exactly what does small Software does is it queries though it attaches via pete rice after which you can searches The full memory for the sequence that we have given there so In such a case related dot red ball or TV is fewer than digital and the moment it finds this pattern it just overrides it with regardless of what we've offered Later on really we learned which the tackle under no circumstances improved so there is no address randomization or things like this but so that you can preserve the Resource flexible for also long term versions we've saved it by doing this and in this article we go below we have found it and now I do using a dangerous change ok so now you see the box motion and you see all types of services which have been to the box and Additionally you see Crimson Bull TV so now it within the background that Daisy prepares every little thing and for that QT browser to start out up after which once the browser is commenced up which is jogging the Box reaches out to google.
de fetches the Website forty DEFCON Lord orc has actually been several occasions down this early morning not less than around the DEFCON safety so unable to that alright fantastic so now we are able to redirected to whatever webpage we wish to this was The purpose where I did the greatest mistake in the overall course of action so since I realized there was a page exactly where there was a livestream and I was capable to patch the browser I talked my spouse I have it I'll be carried out in 5 minutes have you at any time informed your spouse you've got finished in five minutes and after that you are aware of Murphy's Legislation it usually can take 5 hrs or more exact same here so immediately modifying to The brand new URL I acquired a thing which appeared like this The purpose was this codex that they returned towards the browser from the box did not match any of the components codex that were in fact about the box oh guy so rather there nonetheless although not quite so Luckily the serial console basically was providing some more details after the browser starts it tells you which codex it essentially hundreds and supports and after that it had been only a make any difference of locating out are there other streams that we can actually leverage that we could use from this broadcaster and just after looking all-around and matching and making an attempt out many things at last we have been in a position to create a little webpage that selected a selected codec and likewise created it work so let's try this so we wish to go from so now We have now patched it to http dr.
Dublin google.
de and we wish to just take it simply a 2nd I need to go back to An additional slide where I've the first URL I don't need to pass up kind just about anything the trouble is that if I mess up which has a box at this time in time and it requires at least a few minutes to reboot so I consider to avoid this as much as feasible okay so the procedure ID was 1206 okay appears to be like excellent so again connect pre trace look for the memory which time we want to get rid of google.
de and overwrite it with our webpage that we've put within the community travel and now you may see truly the URL again slash user which quickly receives you from your root of the online server down to the on the site which you can add okay that requires a number of seconds listed here we go let's switch back and unfortunate we really need to restart Purple Bull of the whole box fortunately the many internet pages up a bit faster now um now It truly is making an attempt to get the stream and at the very least we must always have the stream which is saying you are not supposed to see this program can take a while must buffer and truly they are actually streaming the information you're not supposed to see this hmm it's possible now huh basically Wow so now we are progressed by now a tad further that is the It is really called now that's weather excellent ah wonderful ah you recognize lastly we ended up able to view Todd out you know it feels so very good if you can at last be sure to your wife Particularly Once you've put a lot work into it so I have told you that truly this clearly show is fairly outdated It really is within the 70s appropriate um they alter actors Fortuitously so this is this is really one of several famous German actors he has also performed in a few American films does any individual understand him was it til Schweiger is his name and he has played such as Nazi killer in Inglourious Basterds it's possible understand that a single Quentin Tarantino movie and he's now also to the demonstrate once more immediately after possessing performed with Quentin Tarantino good feels good sadly and it has talked the talk this morning was pretty fantastic about this um you wish to very own the computer software you want to personal the program new program not merely the hardware the things that I've revealed you is probably not owning the program simply because very little of what has become completed so far is persistent everything was just done in memory with a jogging process and it really is not really as effortless it seems Although your root You can't modify the file method as an example The rationale for which is every little thing is stored in go through-only memory and in the event the system is booted every little thing that should be changed like for example a shadow file hosts file you name it almost everything receives copied to /tmp and is particularly utilized from there and you only see some links to there The explanation for that is fairly basic if you simply pull out the ability or have an influence audit or whatsoever you are able to never crack the box as it will always receive a clean duplicate from ROM and every little thing which is risky unstable is basic about the configuration is likewise stored in a selected area in the home or while in the flash memory you just gotta Be sure that you don't have a power outage for the duration of reflashing or changing configuration settings but for us this was a little bit challenging simply because we needed to be persistent and the vast majority of things that you see similar to the red in purple I have marked every thing which is not changeable like /choose roots use a local s-pen the encrypted file storage The one thing which is seriously persistent and lives prolonged as being the hard disk and we needed to be persistent so some extra specifications we wish to actually attempt to help keep this clean up reset scheme which you at any place in time can unplug the system and it still performs it ought to be persistent and may be writable so would we It could be achievable and depending on the data that we had to actually flesh the travel anytime we wish to have a improve or so to in some way use the harddrive in case you flash a device usually adequate especially when you experiment using a filmer I guarantee you at 1 position you can break it and I only had 1 unit and my spouse didn't desire to wander away lost didn't want to shed this function so I'd to make sure this product stays up and running so One more need or another factor that we were being little bit worried to carry out is we'd failed to would like to patch the key image we only wish to patch the next graphic since the deal with was full of md5 sums and integrity checks investigating the boot course of action we in fact discovered something that was incredibly fascinating there is the init process which begins operate all which runs a Device known as DMA OS ddsh which can be afterward starting the key executable but this script is seeking One more script referred to as optic you type in operate QT inside the OP partition and this script wasn't there so It truly is looking if this file is present if It is really there It is really executing it Otherwise it won't do something so that's fantastic they've got taken out a file and also have remaining the executable within the boot system for us to simply position it there really kind of them there is only somewhat challenge using this type of the challenge Is that this script is run to start with and only following it returns the principle procedure the main executable has started and the main executable DMA OSD is really accountable for mounting the hard drive so we cannot modify anything at all to load supplemental things from your hard disk until finally this closing course of action has started off so let's not have extremely rough obstacle I admit that What exactly we did is basically coming back from operate QT and begin a track record course of action which happens to be checking for that disk drive to come back up but just from the track record so it's the harddrive up yet no Alright let us wait around five wait five seconds there nonetheless no just wait 5 seconds at one level the hard drive is there after which you can we are able to standard continue on to load stuff from there and execute it so in this manner we have produced a second stage Linux start out and if you examine SMB you see it in this article there We've got an init script you only add it to the basis folder through SMB and you have your own personal new boot system second stage obviously on the system itself is a unique path that's alright so now you can begin to switch through SMB the firmware around you want and any adjust everything you do could be reworked essentially there are many limits to that you can only do things outside the basis of s or You must remount it and every one of the processes are by now functioning so you cannot actually modify them besides of other than of patching them with Petrus or anything like like we did so the nice issue concerning this firmware extension is you can do it is possible to undo all the things through SMB you just go there or SMB alter the files back to what they were being right before and when you totally tousled the programs you simply remove all of the information and you're superior to go yet again like the firmware was originally should you even mess up SMB you still have the choice to take the hard disk out for a traditional PC and beneath undo all the improvements so extremely handy strategy to experiment without any hazard of breaking the box so this was a techie section and frequently there is no great social gathering with out lawyers so do We now have some attorneys during the home arrive on there have to be some attorney while in the area but at the least normally as anyone is saying hey you might be discussing Linux How about GPL violations and really yeah Westchester is serious about GPL violations and they are building their firmware offered like a GPL variant alright now you may perhaps say why the heck did you expend all that time on adjust in the original firmware if you only obtain the initial the GPL firmware and add that there's essentially a basis for that due to the fact should you go to the Website there is a warning let me study the final sentence for you after you install third-party or user modified firmware even though the product or service is rolled again to the first firmware from Western Digital access to certain functions will be disabled Exactly what does that suggest that means they delete all DRM keys whenever they find out you're uploading the GPL firmware so no more Spotify there happen to be some issues and forms in which people have not been capable to access Netflix as an example any longer so unlucky isn't going to supply you with the whole function established with a firmware that we're going to launch we have not viewed the lack of any drm keys but we continue to we don't want to offer any ensure for that obviously but given that we have just slightly patched the first femur we essentially Do not be expecting it to blow up disclosure following political subject I seemed up onshore down there have been somewhat more than 500 packing containers which have been openly available on-line five hundred there good deal additional definitely in in residences and closed networks I listened to some estimations there concerning 10 thousand a hundred thousand containers available so I but nevertheless 5 hundred that are openly they're not password safeguarded you'll be able to add things is mb generally and other people may now say Felix There's two remote ways ways to get in the system with this particular you ought to discuss with the vendor And that i show you I have made an effort to I have tried out so tough I discovered an official help case I've contacted their press simply because they're normally the ones most keen on saying hey I choose to existing concerning this at a con they are saying alright let us take care of it initial I have talked to a product internet marketing I have tried to succeed in out to Western Digital men and women on security mailing lists sad to say the answer was constantly many thanks for contacting Western Electronic we will forward your request to and it appears like death null even pinning them in inquiring the hey what's the standing peaceful do We've any person from Western Electronic to in this article tonight if you understand anyone at Western Electronic I actually am serious about acquiring a lot of the things set since it's just too open Therefore if you already know any individual let me know and we could make some progress staying the political subject I are aware that a number of you like conspiracy in the area say I've a person tail Therefore if you think about this you recognize they've got some really serious bucks many of them really appear intentionally like symlinks with a root World-wide-web server pointing proper to your planet's rideable folder However you have got some stakeholders like suppliers of DRM centered services like Netflix Spotify and so forth and they don't need To place their solutions on devices which might be identified to generally be open so why You should not you just go away some backdoors in there that are easy to learn that fulfill the community and concurrently fulfill the demands of another stakeholders ok that is just my conspiracy principle and One more subject matter for many beers tonight what is the outlook um let me initially reveal my scenario now um two months after we have been eventually ready to watch Tata watts each Sunday evening thanks to the assistance of modifying this device we moved houses and received a whole new to cable TV supplier guess what inside their common portfolio was that broadcaster will it talk to them so I had been in a position to remember to my wife for 2 months now It is An additional entity which is performing that every Sunday night possibly existence is better for yourself 1st once again the disclaimer in the event you lose your DRM keys or split or crack your box it is not our dilemma this firmware is only for educational reasons but In case you are now interested in fact acquiring it and it will also be in the final slide and clearly we'll provide the slides out It truly is on WT WD Television up here on comm it is possible to down load there You can even download our Variation of the second phase you already know in its script in case you do not need to produce your own private and you may modify it from there and now you'll be able to go and based on the techniques that offered below patch the procedure to add your own Television set channels or If you would like for instance to acquire tore it on the box since it's lower electrical power consumption and you ought to watch the videos on there any methods it is possible to insert torrents a little a bit torrent on there or Should you have issues not observing other international locations streams since your IP limited to you IP limited but even incorporate VPN expert services to it and for anyone who is seriously outrageous It's also possible to discover a mips Model of Bitcoin mining and check out to hammer the box with a few Bitcoin suitable but you will not get wealthy with us I am just a touch You may use Debian squeeze offers for missile and simply add the executables and libraries on the box and Many of them get the job done right away we haven't been the very first kinds to actually investigate this there is a great man referred to as be pink and he has done great work on the past packing containers from Western Electronic Many of them ended up without having storage but it is best to certainly go and take a look at his his pages to receive some far more inspiration making sure that leaves us with a three minutes still left for queries and Here is also your tasteful just in case you would like to Check out and Enjoy somewhat which has a firmware let's give him a hand yet another time now now one thing I do not know in case you men are noticing but all of our promote lots of our speakers which have earned their their their their merits are acquiring these patches how Many of us in this article believe Felix's spouse ought to get a patch too.
so our future converse is gonna be Tremendous amazing on the lookout ahead to this and we've got An additional Are living demo we are gonna find out about how to mess along with your Clever Television set procedure and I'm guessing probably enable it to be do things which it was not intended to initially is that proper that's great outstanding properly with any luck , it does anything that it absolutely was supposed for currently ideal yeah all proper all right prepared to go all correct very well let us give a large major occasion observe welcome to Felix and let us get this detail begun all right um can it be on are we nonetheless gotta receive the movie create up mainly because I want to demonstrate live how to use the procedure and the like so I introduced a box but we must swap to some video projector between so we remain working on it all right lit up here we go all right there's no seem commences incredibly perfectly This can be how my Tale commences who basically is aware of what it can be sorry that may be Tata that is a German Television series It really is a crime sequence It truly is almost as outdated as Columbo the only real change is that they are still manufacturing exhibits and It is continue to functioning so when some German family members it is a custom that after the weekend is above on Sunday night quarter earlier eight you sit down you switch on the very first Television set channel that was ever there and that is continue to there and you also viewed the show new episode and since it's a custom It is also something that my spouse and I like to do and we moved to another country a couple of years back and unfortunately we ended up unable to see this clearly show any more and It can be kind of sad and that is the start on the story so where my my title is Felix Lida and my enthusiasm is usually to acquire factors aside and also to place other items with each other that support to take points aside besides that I'd like to be out while in the snow or from the drinking water and to explain you a bit far more what I mean by taking items apart I choose to hunt bugs and malware and collect them I also like to analysis associate takeovers and countermeasures and i am closely linked to the unaired project through my working day work I function all-around cellular menace analysis at a very pleasant company called Blue Coat but this research I'm presenting is don't just my own do the job you understand just about every study has some supporters and In this instance It really is a bunch of people from corporation named enzymes and so they assisted me using this type of so the background with the Tale is usually that we had this box a Western Digital Television existence hub I even have just one on stage here and it's It really is an extremely great bit of components basing makes your dumb Television sensible and For those who have a smart Tv set you obtain much more services and much more prospects to accomplish stuff you see below as HDMI output there are also two USB ports it supports Wi-Fi then and device Television attach a keyboard and stuff similar to this but what is additional intriguing is as the moment it appears to be much more like an Apple Television or something similar to this What's more, it provides a 1 terabyte hard disk in there and that's sort of neat mainly because Then you can certainly upload all your flicks It really is all on one machine you don't want an extra storage like an ass or one thing to make sure that's pretty convenient the processor in There exists rather of slower to MIPS processor but It is also not answerable for actively playing the video essentially the codecs are all and hardware to the technique they usually Guantee that you'll be able to Enjoy the video clips fast enough back to your Tale so this box previously has all kinds of products and services on there which happen to be quite wonderful like YouTube and Spotify and things such as this and immediately after we did not have this Tv set demonstrate you're not tada laughter for a while my wife actually stated you recognize you happen to be usually breaking things The full time why Never you for the moment do something beneficial using this and put my favored display on this box and you know when your wife asks you something such as this you far better you should definitely please her in fact I hope my wife is just not right here simply because she would likely remark nicely what Did you know regarding how to remember to me properly which is a distinct Tale alright alright so let us start now in advance of we start we also are gonna launch the modifications that We've finished for the firmware so we want a disclaimer That is for educational or study reasons provided that you do what We've done below so you crack your box it isn't our fault and we will never have people today simply cannot assistance you also if you utilize any sort of DRM keys etc about the Box it's actually not our fault all right a lot for your disclaimer um initial step initially attempt was we did in offline in Assessment of the disk that is in there essentially taken it out plugging it into Laptop or computer see what's on there and it began pretty really lucky we observed A non-public partition on there but right after a few minutes we uncovered to choose from's actually almost nothing absolutely nothing of relevance on that partition just some offline storage for Spotify and hope htb and Other than that there's just the partition that holds all the data many of the videos that we add and swap so which was very little unfortunately bad try getting some pressure presently from my wife for losing time 2nd phase this box has an update system it quickly reaches out to Western Digital to examine if there's a new firmware and if there is it asks if you want to install it and it does all of that mechanically you can also download the firmware manually in case you go to their assist web page and see what is in the update so as soon as we down load all this we noticed that there is a zip file and while in the zip file We've 5 different other information and two that look like really exciting one particular is really a bin file and a person is named bi – they are one hundred fifty megabytes about and we want to check if we discover something that we can identify in there and fortune we did there is a squash FS filesystem in there nevertheless it's at offset 32 so I however will need a lot of people drinking with me tonight so you get a beer if you can solution what the initial 32 byte may very well be in the event you guess proper any Strategies what the primary 32 byte prior to the additional file process image our signature Excellent who stated it 1st all correct return later to me out bio bio beer perfect yeah it seems It really is an md5 signature of The full picture and so we began looking into this a little more intently how the photographs appear to be and really Everything you see is you might have two different pictures that compose The full working procedure around the device it is a Linux technique during which a person is the basis filesystem basically for everything from root downwards it's got an finish signature such as the size and in the quite commencing such as the gentleman just stated there is certainly the md5 of The complete image this md5 is then also appended to the 2nd image which is often mounted at /decide which once again has A further signature within the pretty front to be certain they all suit with each other and nothing's broken and those two alongside one another in essence make up the image now let's check into the material that is a tiny bit little bit smaller I know that so I am going to reveal it within the left aspect the thing is the principle image the foundation impression and it's got the standard init method which initializes The complete device it's got a config file with some static config and it's got One more file with md5sum d5s During this presentation looks like Western Digital likes md5 on the proper facet you will find the OP folder and there was just one attention-grabbing folder termed World-wide-web server which actually appeared pretty appealing so with this particular there was sufficient info to truly modify the box but we ended up a little bit hesitant about no matter if we must always just modify the firmware and upload a fresh a single for The main reason that we were not confident when they did not have far more md5 checks there and it looked like they had a lot so we were being a little hesitant to change the firmware and perhaps just split that solitary product that we experienced the opposite alternative was let us go hunt for many vulnerabilities could acquire more time but It is also extra fun suitable Alright so a vulnerability getting first thing was to consider the webserver um this matter provides a webserver allow me to also swiftly switch to the place We've Firefox here we have Firefox which is everyday living over the box now so you see that is the entry for those who once you log in you and the password is admin by the way when you log in you obtain a handheld remote control but You can even alter the password etc to ensure glance form of promising and Thankfully the PHP which is utilized to change every one of the configuration will not be encoded encrypted or just about anything It is really just they are in simple to ensure's always a great commence you are aware of starting from the world wide web server SQL injection which was the first endeavor and as you are able to see there's a really awesome SQL assertion at the bottom and that is composed of parameters right from the get requests like entry ID language ID fantastic and that is working with SQLite so Here is the assertion that could really generate an SQLite database that is concurrently an SQLite and a sound PHP file does any have any one listed here have expertise with the PDO databases driver someone about right here what is actually the situation Never see it PDO only will allow a single statement at a time and we wished to inject 5 statements listed here so regrettable failed to get the job done and even if it experienced labored we found out afterwards this A part of the file units actually read through only so no possibility whatsoever bummer ok past the webserver keep track of up coming issue to try was remote file inclusion and what we discovered is you will find an remote file inclusion or perhaps a file inclusion possibility based upon the language which is stored while in the cookie so allow me to switch again to the internet server and you will see you there You should enter a password and down in this article You will need to can decide on the language ok I've a cookie editor up listed here and if we refresh it you'll be able to see there is a language ID of three in in this article so we ended up thinking okay can we just modify this adding a few dots introducing a couple of slashes they press the correct button screens a tiny bit far-off yeah I did In order you may see now we get an error information expressing oh it did not find the file open up or PHP after which you can we thought alright um why not simply upload a file known as dwelling dot PHP into the folder that we are able to obtain by using SMB after which modify the cookie to position to that and actually can determine the path just by taking a look at the firmware okay I press the incorrect button sorry the cookie editor is actually tiny and it's tough to see the screen basically from below alright Wow good now we bought a PHP shell so Those people of you who've labored with PHP shells know that they are suffering inside the ass correct so the very first thing you ought to do is attempt to determine if you can find telling it on there and truly explain to it had been on there so we want to activate it and acquire on on the box and I have to confess my track record is generally not an excessive amount of the embedded products but a lot more such as Computer system entire world and usually whenever you own the world wide web server the next thing you do is think about privilege escalation all ideal so um exact issue below let us go and switch it to the box and in an effort to know like from which it count to him escaped or to have the privileges initially you figure out which account you might be Learn more and oh hey Now we have Ruud presently this was considerably a lot easier than I predicted but You can even see my stupidity about the screen for the reason that basically the PHP shell by now lets you know that you are route alright pleasant so this was just the beginning simply because we ended up in a position to get route but a lesson that I experienced to find out in the course of the experience is Really don't begin with SQL injection Really don't get started with a distant file inclusion Never get started with SQLite privilege a privilege escalation stuff similar to this search for the actually very low hanging fruits so investigating the graphic label even further I found that really the blokes from Western Digital had put up a symlink with the Website services root directory suitable on the disk so it was not even needed to upload or to test to use the process and i am not fairly sure if they have just neglected it or whether or not they desired to make it very simple for men and women for the reason that if I just say consumer keep or PHP and that is priya authentication no authentication at this point I also obtain the shell just in a special Listing ah which is wonderful so but I thought properly if It is that uncomplicated we most likely uncover far more stuff so hum For those who have seen the main talk this morning hacking 22 points in forty five minutes it had been an excellent discuss the fellows have taken a component the Google Tv set before and they went for UART so we tried the same we also experienced a look over the board and attempted to determine in which our pins or wherever our soloing details exactly where we may possibly include some pins and we uncovered that there are two pins that truly are candidates you see them both of those in the picture here and a small amount of measuring all around and things like this we found out which the one particular from the entrance which is closer into the chasis that is truly a standard u artwork which might be X there's tx2 ground and also a three.
three volt pin and here's the warning in order to Do that at home it is a three.
3 volts and also your Laptop is five volts you are able to burn up either your Personal computer you'll be able to burn off the box or you can melt away there one example is USB to UART converter I have burned 3 there was there was my lesson acquired of not getting low-cost things from Taiwan Just what exactly do you obtain When you attach a serial console so after you set up you have all sorts of information about the program in which the image is stored what else is in which configurations exactly what is presently loaded which drivers are loaded and actually If you have the technique up and running and see the display screen from the procedure and you push a button over the remote control or some thing it tells you exactly which button you happen to be pressed and which actions are taken in an effort to get there so this is ideal debugging great when it had been concluded umm the thing is anything like this I told you they like md5 so you see an md5 and you see login what's the password that's an opportunity for profitable One more beard tonight guy it's actually not that effortless it's actually not as simple as hacker as admin as OAM root or a thing these guys like md5 let's have a look sorry md5 50 % which at yeah It is really shut but it's not pretty It is a bit more innovative basically I talked to a different person a few minutes previously he mentioned really not less than I did another thing right but let us have a closer seem so um the shadow file that actually exists in TMP shadow and et Cie shadow is simply a connection to that and we located the hash in there and began to about the Ripper naturally mainly because we would like to understand what it can be but that doesn't didn't get us incredibly significantly immediately so we started investigating a bit nearer And that i instructed you the serial line is extremely valuable for debugging there was actually one line expressing password for root modified as you are able to see with the screenshot there also like other information and facts but like which modules are commenced in advance of which modules are started out and loaded soon after many stuff similar to this so this was genuinely practical to trace triage which module which method was basically liable for this there is a Instrument known as G bus go through serial variety and that is located in a folder that's not inside of the first firmware picture It is really basically an encrypted addition into the file procedure making use of AES encryption which is later quantity to employ a neighborhood s pin and right here you find some stability by obscurity as it's situated in slash house slash file and that's that contains lots of fascinating information and facts I have also set the data below the way you can actually extract the AES vital but I am not likely to go into the main points which is extra for reference so This is how it seems to be visually We have now in the home folder a file code file we contain the AES essential in ROM and Later on things is extracted to the folder or mounted right into a complete a user community s bin and We now have this system and there is also Yet another system in there that's 13 megabytes in size called DMA OSD since This really is an encrypted folder we previously considered this is probably quite interests point let us have a closer glimpse but let us get again to exactly what is the password so after We've the program we have been truly ready to reverse engineer The most cost effective beats arena and we found out It truly is undertaking a process contact some method function simply call not a method get in touch with the place the serial quantities made use of the md5 of that is really developed and it is the password how do you obtain the serial selection Use a consider the box yeah there's actually A simpler way Have got a think about the login display screen because the serial number is the md5 ideal before login I didn't deliver the serial cable or I actually introduced a co a cable but considering the fact that I blue screen my Home windows several occasions Together with the serial cable I don't want to test it out right here we can check out it out with Linux later because that actually works much better but I still desire to demo to you men how this basically appears like alright login This is the password would be the password prompt we wish to login as root we must duplicate and paste see but you realize so I am gonna variety it below so You do not see that display and It is really just calculating the md5 sum then over below pastes hey have One more ruler this was the password Incidentally all right you almost certainly know this by yourself at this stage in time you say Certainly suitable result in your root usually feels excellent being root Primarily on techniques that you choose to have not been ruled on before so that is the stage in time when my wife arrived bacon Seems superior are you presently done still and It really is halfway all right neck because next step was truly to find out wherever will be the apps Found and if you Go searching on the foundation filesystem or within the file technique generally you will discover many logos for your expert services and loads of hints and you find some DRM data files but You will also find some applications for which You simply locate the logos and nothing else one of them is Red Bull Pet TV AOL developed EE and several Other individuals so we was we were truly wanting to know in which would be the apps especially for those I understand we had a closer take a look at this process DMA o s D the on monitor Screen This is actually the final approach that commenced as Portion of the init course of action if this process dies the whole box immediately reboots there's a watchdog about it It truly is located in the encrypted partition that we were being referring to with AES just before and this solitary system makes use of up a hundred and fifty megabytes with the 200 out there about the box so it looks like this is an important piece and searching additional carefully into this process we truly discovered some tough-coded your else in there like by way of example HD aol.
com slash Western Electronic hdhd em plus some others ok and after you go to these Websites and now I have to check the resolution on the projector here let's drop by AOL It is really not easy to see on AOL let us Do this Russian framework this Russian web site so that is a Russian movie site and generally you can buy or down load stream video clips from there and That which you see is there's a white bar with the pretty base that is not Component of the design so if you go to those Websites along with your browser you see that they're particularly 1280 x 1024 pixels in dimension and that is what precisely the box is exhibiting in your TV so these internet pages are created specially to ensure that a browser on this equipment this box can obtain them and the thing is Anything you're imagined to see all right so that offers us some pointers some more information about this DMA OSD executable and wherever the browser is so It can be 30 megabytes and that's massive especially for embedded products It can be actually fairly huge presently for x86 but smaller and because of the unit like this can it be's huge and The rationale for this almost everything is joined in statically there is a QT centered World-wide-web browser in there there are libraries for HDMI for accessing the hardware codecs and there is a logic in there to automated USB sticks look for firmware mechanically sync by using a hard disk drive stuff such as this it controls the network shares there is certainly an update demon in there naturally the renderer for that on-display screen menus and it on get started loads all shots that it finds in certain certain folders over the disk all into memory so this is really a piece where you need to dig deeper in case you want to essentially modify the on display Screen and include for some new Television set stations What exactly the next action that we did so as to know more from the logic in there was to make a GDP server put around the box to ensure that we could connect a debugger within the box where it's jogging and after that Command this from A further device the data to the slide is just for your reference just in case you choose to consider it out to would be the computation alter the nice issue is if you're already reverse engineering The full detail plus a functioning Ida Professional Ida Professional contains a GDP stuff by now built-in and they aid MIPS so that you can in fact use Ida Professional right away to debug this method regrettably it breaks occasionally so Never Do not totally rely upon it this is really Expense several evenings alright truly at this time my spouse arrived again and looked about my shoulder stated you might be once again taking a look at assembly what's the standing the program is commencing before long I choose to see it I explained I'm generating progress but um Let's examine so now We all know there's a World wide web server within the box appropriate and there is 1 nice factor the broadcaster does question them they have a Stay stream they've got a Are living stream on-line and I would like to check out it naturally there isn't any tart or operating in the mean time Let's have a look at if we can actually obtain a Are living stream there simply because they block some information to other web sites now unfortunately not at this time I hoped that they are streaming not less than in information they are not about and we are going to nevertheless provide you with how the things will work so this time I was um focused on go for your very low hanging fruits you know In such cases the lower hanging fruits in fact go into the procedure look for about where by are definitely the URLs the difficult-coded URLs and maybe just capture a few to truly incorporate the favorite TV station that we wish to have okay switching back on the box so so 1206 is the process ID that we wish to patch 1206 and we wish to let us take by way of example the Pink Bull entry appletv entry and we redirected to in Germany all right so Exactly what does small Software does is it queries though it attaches via pete rice after which you can searches The full memory for the sequence that we have given there so In such a case related dot red ball or TV is fewer than digital and the moment it finds this pattern it just overrides it with regardless of what we've offered Later on really we learned which the tackle under no circumstances improved so there is no address randomization or things like this but so that you can preserve the Resource flexible for also long term versions we've saved it by doing this and in this article we go below we have found it and now I do using a dangerous change ok so now you see the box motion and you see all types of services which have been to the box and Additionally you see Crimson Bull TV so now it within the background that Daisy prepares every little thing and for that QT browser to start out up after which once the browser is commenced up which is jogging the Box reaches out to google.
de fetches the Website forty DEFCON Lord orc has actually been several occasions down this early morning not less than around the DEFCON safety so unable to that alright fantastic so now we are able to redirected to whatever webpage we wish to this was The purpose where I did the greatest mistake in the overall course of action so since I realized there was a page exactly where there was a livestream and I was capable to patch the browser I talked my spouse I have it I'll be carried out in 5 minutes have you at any time informed your spouse you've got finished in five minutes and after that you are aware of Murphy's Legislation it usually can take 5 hrs or more exact same here so immediately modifying to The brand new URL I acquired a thing which appeared like this The purpose was this codex that they returned towards the browser from the box did not match any of the components codex that were in fact about the box oh guy so rather there nonetheless although not quite so Luckily the serial console basically was providing some more details after the browser starts it tells you which codex it essentially hundreds and supports and after that it had been only a make any difference of locating out are there other streams that we can actually leverage that we could use from this broadcaster and just after looking all-around and matching and making an attempt out many things at last we have been in a position to create a little webpage that selected a selected codec and likewise created it work so let's try this so we wish to go from so now We have now patched it to http dr.
Dublin google.
de and we wish to just take it simply a 2nd I need to go back to An additional slide where I've the first URL I don't need to pass up kind just about anything the trouble is that if I mess up which has a box at this time in time and it requires at least a few minutes to reboot so I consider to avoid this as much as feasible okay so the procedure ID was 1206 okay appears to be like excellent so again connect pre trace look for the memory which time we want to get rid of google.
de and overwrite it with our webpage that we've put within the community travel and now you may see truly the URL again slash user which quickly receives you from your root of the online server down to the on the site which you can add okay that requires a number of seconds listed here we go let's switch back and unfortunate we really need to restart Purple Bull of the whole box fortunately the many internet pages up a bit faster now um now It truly is making an attempt to get the stream and at the very least we must always have the stream which is saying you are not supposed to see this program can take a while must buffer and truly they are actually streaming the information you're not supposed to see this hmm it's possible now huh basically Wow so now we are progressed by now a tad further that is the It is really called now that's weather excellent ah wonderful ah you recognize lastly we ended up able to view Todd out you know it feels so very good if you can at last be sure to your wife Particularly Once you've put a lot work into it so I have told you that truly this clearly show is fairly outdated It really is within the 70s appropriate um they alter actors Fortuitously so this is this is really one of several famous German actors he has also performed in a few American films does any individual understand him was it til Schweiger is his name and he has played such as Nazi killer in Inglourious Basterds it's possible understand that a single Quentin Tarantino movie and he's now also to the demonstrate once more immediately after possessing performed with Quentin Tarantino good feels good sadly and it has talked the talk this morning was pretty fantastic about this um you wish to very own the computer software you want to personal the program new program not merely the hardware the things that I've revealed you is probably not owning the program simply because very little of what has become completed so far is persistent everything was just done in memory with a jogging process and it really is not really as effortless it seems Although your root You can't modify the file method as an example The rationale for which is every little thing is stored in go through-only memory and in the event the system is booted every little thing that should be changed like for example a shadow file hosts file you name it almost everything receives copied to /tmp and is particularly utilized from there and you only see some links to there The explanation for that is fairly basic if you simply pull out the ability or have an influence audit or whatsoever you are able to never crack the box as it will always receive a clean duplicate from ROM and every little thing which is risky unstable is basic about the configuration is likewise stored in a selected area in the home or while in the flash memory you just gotta Be sure that you don't have a power outage for the duration of reflashing or changing configuration settings but for us this was a little bit challenging simply because we needed to be persistent and the vast majority of things that you see similar to the red in purple I have marked every thing which is not changeable like /choose roots use a local s-pen the encrypted file storage The one thing which is seriously persistent and lives prolonged as being the hard disk and we needed to be persistent so some extra specifications we wish to actually attempt to help keep this clean up reset scheme which you at any place in time can unplug the system and it still performs it ought to be persistent and may be writable so would we It could be achievable and depending on the data that we had to actually flesh the travel anytime we wish to have a improve or so to in some way use the harddrive in case you flash a device usually adequate especially when you experiment using a filmer I guarantee you at 1 position you can break it and I only had 1 unit and my spouse didn't desire to wander away lost didn't want to shed this function so I'd to make sure this product stays up and running so One more need or another factor that we were being little bit worried to carry out is we'd failed to would like to patch the key image we only wish to patch the next graphic since the deal with was full of md5 sums and integrity checks investigating the boot course of action we in fact discovered something that was incredibly fascinating there is the init process which begins operate all which runs a Device known as DMA OS ddsh which can be afterward starting the key executable but this script is seeking One more script referred to as optic you type in operate QT inside the OP partition and this script wasn't there so It truly is looking if this file is present if It is really there It is really executing it Otherwise it won't do something so that's fantastic they've got taken out a file and also have remaining the executable within the boot system for us to simply position it there really kind of them there is only somewhat challenge using this type of the challenge Is that this script is run to start with and only following it returns the principle procedure the main executable has started and the main executable DMA OSD is really accountable for mounting the hard drive so we cannot modify anything at all to load supplemental things from your hard disk until finally this closing course of action has started off so let's not have extremely rough obstacle I admit that What exactly we did is basically coming back from operate QT and begin a track record course of action which happens to be checking for that disk drive to come back up but just from the track record so it's the harddrive up yet no Alright let us wait around five wait five seconds there nonetheless no just wait 5 seconds at one level the hard drive is there after which you can we are able to standard continue on to load stuff from there and execute it so in this manner we have produced a second stage Linux start out and if you examine SMB you see it in this article there We've got an init script you only add it to the basis folder through SMB and you have your own personal new boot system second stage obviously on the system itself is a unique path that's alright so now you can begin to switch through SMB the firmware around you want and any adjust everything you do could be reworked essentially there are many limits to that you can only do things outside the basis of s or You must remount it and every one of the processes are by now functioning so you cannot actually modify them besides of other than of patching them with Petrus or anything like like we did so the nice issue concerning this firmware extension is you can do it is possible to undo all the things through SMB you just go there or SMB alter the files back to what they were being right before and when you totally tousled the programs you simply remove all of the information and you're superior to go yet again like the firmware was originally should you even mess up SMB you still have the choice to take the hard disk out for a traditional PC and beneath undo all the improvements so extremely handy strategy to experiment without any hazard of breaking the box so this was a techie section and frequently there is no great social gathering with out lawyers so do We now have some attorneys during the home arrive on there have to be some attorney while in the area but at the least normally as anyone is saying hey you might be discussing Linux How about GPL violations and really yeah Westchester is serious about GPL violations and they are building their firmware offered like a GPL variant alright now you may perhaps say why the heck did you expend all that time on adjust in the original firmware if you only obtain the initial the GPL firmware and add that there's essentially a basis for that due to the fact should you go to the Website there is a warning let me study the final sentence for you after you install third-party or user modified firmware even though the product or service is rolled again to the first firmware from Western Digital access to certain functions will be disabled Exactly what does that suggest that means they delete all DRM keys whenever they find out you're uploading the GPL firmware so no more Spotify there happen to be some issues and forms in which people have not been capable to access Netflix as an example any longer so unlucky isn't going to supply you with the whole function established with a firmware that we're going to launch we have not viewed the lack of any drm keys but we continue to we don't want to offer any ensure for that obviously but given that we have just slightly patched the first femur we essentially Do not be expecting it to blow up disclosure following political subject I seemed up onshore down there have been somewhat more than 500 packing containers which have been openly available on-line five hundred there good deal additional definitely in in residences and closed networks I listened to some estimations there concerning 10 thousand a hundred thousand containers available so I but nevertheless 5 hundred that are openly they're not password safeguarded you'll be able to add things is mb generally and other people may now say Felix There's two remote ways ways to get in the system with this particular you ought to discuss with the vendor And that i show you I have made an effort to I have tried out so tough I discovered an official help case I've contacted their press simply because they're normally the ones most keen on saying hey I choose to existing concerning this at a con they are saying alright let us take care of it initial I have talked to a product internet marketing I have tried to succeed in out to Western Digital men and women on security mailing lists sad to say the answer was constantly many thanks for contacting Western Electronic we will forward your request to and it appears like death null even pinning them in inquiring the hey what's the standing peaceful do We've any person from Western Electronic to in this article tonight if you understand anyone at Western Electronic I actually am serious about acquiring a lot of the things set since it's just too open Therefore if you already know any individual let me know and we could make some progress staying the political subject I are aware that a number of you like conspiracy in the area say I've a person tail Therefore if you think about this you recognize they've got some really serious bucks many of them really appear intentionally like symlinks with a root World-wide-web server pointing proper to your planet's rideable folder However you have got some stakeholders like suppliers of DRM centered services like Netflix Spotify and so forth and they don't need To place their solutions on devices which might be identified to generally be open so why You should not you just go away some backdoors in there that are easy to learn that fulfill the community and concurrently fulfill the demands of another stakeholders ok that is just my conspiracy principle and One more subject matter for many beers tonight what is the outlook um let me initially reveal my scenario now um two months after we have been eventually ready to watch Tata watts each Sunday evening thanks to the assistance of modifying this device we moved houses and received a whole new to cable TV supplier guess what inside their common portfolio was that broadcaster will it talk to them so I had been in a position to remember to my wife for 2 months now It is An additional entity which is performing that every Sunday night possibly existence is better for yourself 1st once again the disclaimer in the event you lose your DRM keys or split or crack your box it is not our dilemma this firmware is only for educational reasons but In case you are now interested in fact acquiring it and it will also be in the final slide and clearly we'll provide the slides out It truly is on WT WD Television up here on comm it is possible to down load there You can even download our Variation of the second phase you already know in its script in case you do not need to produce your own private and you may modify it from there and now you'll be able to go and based on the techniques that offered below patch the procedure to add your own Television set channels or If you would like for instance to acquire tore it on the box since it's lower electrical power consumption and you ought to watch the videos on there any methods it is possible to insert torrents a little a bit torrent on there or Should you have issues not observing other international locations streams since your IP limited to you IP limited but even incorporate VPN expert services to it and for anyone who is seriously outrageous It's also possible to discover a mips Model of Bitcoin mining and check out to hammer the box with a few Bitcoin suitable but you will not get wealthy with us I am just a touch You may use Debian squeeze offers for missile and simply add the executables and libraries on the box and Many of them get the job done right away we haven't been the very first kinds to actually investigate this there is a great man referred to as be pink and he has done great work on the past packing containers from Western Electronic Many of them ended up without having storage but it is best to certainly go and take a look at his his pages to receive some far more inspiration making sure that leaves us with a three minutes still left for queries and Here is also your tasteful just in case you would like to Check out and Enjoy somewhat which has a firmware let's give him a hand yet another time now now one thing I do not know in case you men are noticing but all of our promote lots of our speakers which have earned their their their their merits are acquiring these patches how Many of us in this article believe Felix's spouse ought to get a patch too.