Search found 65 matches

by mamaich
Wed Dec 01, 2010 5:34 am
Forum: [C] General
Topic: Hacking TV over Hotel mode (most C series models)
Replies: 288
Views: 192520

Re: Hack for C550 and other C models

One note. If you'll read the above instructions - you'll see that link2 file creates the /mtd_rwarea/usb_mount/killself.sh script that would delete itself and other scripts 120 seconds after TV is powered on. So the TV would return back to non-hacked mode. So if you'll need the fulltime hack - comme...
by mamaich
Tue Nov 30, 2010 12:25 pm
Forum: [C] Firmware
Topic: exeDSP reverse engeneering
Replies: 17
Views: 7856

exeDSP reverse engeneering

Is there any information regarding exeDSP reverse engineering? As far as I see - "SamyConsole (v2.1).zip", "Audio Stream Switcher (v0.2).zip" and other modules dynamically import and hook different exeDSP functions. Can their authors share all the information they have? I think that there would be l...
by mamaich
Mon Nov 22, 2010 1:45 am
Forum: [C] Firmware
Topic: [How-To] Hacking C series TV. Models with Internet@TV only
Replies: 180
Views: 18072

Re: Hacking C series TV. It`s already done!

juuso
Do you have a log taken from c550 with a patched root.img, where it reboots after 20 seconds?
I hope to see there an error string from authuld.
by mamaich
Sun Nov 21, 2010 12:43 pm
Forum: [C] Firmware
Topic: [How-To] Hacking C series TV. Models with Internet@TV only
Replies: 180
Views: 18072

Re: Hacking C series TV. It`s already done!

A silly question. As far as I see - authuld is located in rootfs. What would happen if you'll just delete it or replace it with some empty executable file?
by mamaich
Sun Nov 21, 2010 4:29 am
Forum: [C] Firmware
Topic: [How-To] Hacking C series TV. Models with Internet@TV only
Replies: 180
Views: 18072

Re: Hacking C series TV. It`s already done!

process is going on and we have some results on C550 (unfortunatly negative yet: at least two c550 dead and one c650 bricked too). I'm just a new owner of LE40C550, and I see that firmware update contains rootfs.img that seems to be a non-encrypted file with squashfs filesystem. It also seems that ...

Go to advanced search