Philips 46PFL4007 Smart TV

This is general talk area for things that NOT RELATED WITH TV! Instead, about internal works like web site, forum, wiki, or talking, etc...
Post Reply

coolrecep
Posts: 18
Joined: Sun Oct 02, 2011 2:15 pm

Philips 46PFL4007 Smart TV

Post by coolrecep »

Hi guys, long time no see :) Since sony took the 52LX900 review TV, I have bought myself a Philips 42PFL4007 smart tv. It has 3.5mm service port. So, I think it is a good place to start with. Also here is the latest FW. Can you guys run some tools on it?

http://www.p4c.philips.com/cgi-bin/dcbi ... k_Software

Thnaks.

And also this is the NMAP result:

Code: Select all

Starting Nmap 6.01 ( http://nmap.org ) at 2012-09-27 23:26 T?rkiye Yaz Saati


NSE: Loaded 93 scripts for scanning.


NSE: Script Pre-scanning.


Initiating ARP Ping Scan at 23:26


Scanning 10.0.0.38 [1 port]


Completed ARP Ping Scan at 23:26, 0.27s elapsed (1 total hosts)


Initiating Parallel DNS resolution of 1 host. at 23:26


Completed Parallel DNS resolution of 1 host. at 23:26, 2.51s elapsed


Initiating SYN Stealth Scan at 23:26


Scanning 10.0.0.38 [65535 ports]


Discovered open port 49153/tcp on 10.0.0.38


Discovered open port 1925/tcp on 10.0.0.38


Discovered open port 2323/tcp on 10.0.0.38


Completed SYN Stealth Scan at 23:26, 10.73s elapsed (65535 total ports)


Initiating Service scan at 23:26


Scanning 3 services on 10.0.0.38


Service scan Timing: About 33.33% done; ETC: 23:30 (0:02:32 remaining)


Service scan Timing: About 66.67% done; ETC: 23:29 (0:00:53 remaining)


Completed Service scan at 23:28, 126.39s elapsed (3 services on 1 host)


Initiating OS detection (try #1) against 10.0.0.38


NSE: Script scanning 10.0.0.38.


Initiating NSE at 23:28


Completed NSE at 23:28, 0.02s elapsed


Nmap scan report for 10.0.0.38


Host is up (0.0043s latency).


Not shown: 65532 closed ports


PORT      STATE SERVICE  VERSION


1925/tcp  open  unknown


2323/tcp  open  3d-nfsd?


49153/tcp open  unknown


2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :


==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============


SF-Port1925-TCP:V=6.01%I=7%D=9/27%Time=5064B679%P=i686-pc-windows-windows%


SF:r(GetRequest,153,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\nAcc


SF:ess-Control-Allow-Origin:\x20\*\r\nCache-Control:\x20no-cache\r\nConten


SF:t-type:\x20text/html;\x20charset=utf-8\r\nDate:\x20Thu,\x2027\x20Sep\x2


SF:02012\x2020:26:31\x20GMT\r\n\r\n<html>\r\n<head><title>JointSpace</titl


SF:e></head>\r\n<body>\r\n\x20\x20\x20\x20<h1>Welcome\x20to\x20JointSpace<


SF:/h1>\r\n\x20\x20\x20\x20<h2><a\x20href=\"1/doc/API\.html\">API\x20refer


SF:ence</a></h2>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,117,"HTTP/1\.0\


SF:x20405\x20Method\x20Not\x20Allowed\r\nContent-Length:\x2090\r\nAccess-C


SF:ontrol-Allow-Origin:\x20\*\r\nCache-Control:\x20no-cache\r\nContent-typ


SF:e:\x20text/html;\x20charset=utf-8\r\nDate:\x20Thu,\x2027\x20Sep\x202012


SF:\x2020:26:31\x20GMT\r\n\r\n<html><head><title>Method\x20not\x20allowed<


SF:/title></head><body>Method\x20not\x20allowed</body></html>")%r(RTSPRequ


SF:est,117,"HTTP/1\.1\x20405\x20Method\x20Not\x20Allowed\r\nContent-Length


SF::\x2090\r\nAccess-Control-Allow-Origin:\x20\*\r\nCache-Control:\x20no-c


SF:ache\r\nContent-type:\x20text/html;\x20charset=utf-8\r\nDate:\x20Thu,\x


SF:2027\x20Sep\x202012\x2020:26:31\x20GMT\r\n\r\n<html><head><title>Method


SF:\x20not\x20allowed</title></head><body>Method\x20not\x20allowed</body><


SF:/html>")%r(FourOhFourRequest,FC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nCo


SF:ntent-Length:\x2072\r\nAccess-Control-Allow-Origin:\x20\*\r\nCache-Cont


SF:rol:\x20no-cache\r\nContent-type:\x20text/html;\x20charset=utf-8\r\nDat


SF:e:\x20Thu,\x2027\x20Sep\x202012\x2020:26:57\x20GMT\r\n\r\n<html><head><


SF:title>Not\x20Found</title></head><body>Not\x20Found</body></html>")%r(S


SF:IPOptions,117,"HTTP/1\.1\x20405\x20Method\x20Not\x20Allowed\r\nContent-


SF:Length:\x2090\r\nAccess-Control-Allow-Origin:\x20\*\r\nCache-Control:\x


SF:20no-cache\r\nContent-type:\x20text/html;\x20charset=utf-8\r\nDate:\x20


SF:Thu,\x2027\x20Sep\x202012\x2020:27:07\x20GMT\r\n\r\n<html><head><title>


SF:Method\x20not\x20allowed</title></head><body>Method\x20not\x20allowed</


SF:body></html>");


==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============


SF-Port49153-TCP:V=6.01%I=7%D=9/27%Time=5064B67E%P=i686-pc-windows-windows


SF:%r(GetRequest,CD,"HTTP/1\.1\x20404\x20Not\x20Found\r\nSERVER:\x20Window


SF:s2000/0\.0\x20UPnP/1\.0\x20PhilipsIntelSDK/1\.4\x20DLNADOC/1\.50\r\nCON


SF:NECTION:\x20close\r\nCONTENT-LENGTH:\x2048\r\nCONTENT-TYPE:\x20text/htm


SF:l\r\n\r\n<html><body><h1>404\x20Not\x20Found</h1></body></html>")%r(HTT


SF:POptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nSERVER:\x20Windo


SF:ws2000/0\.0\x20UPnP/1\.0\x20PhilipsIntelSDK/1\.4\x20DLNADOC/1\.50\r\nCO


SF:NNECTION:\x20close\r\nCONTENT-LENGTH:\x2054\r\nCONTENT-TYPE:\x20text/ht


SF:ml\r\n\r\n<html><body><h1>501\x20Not\x20Implemented</h1></body></html>"


SF:)%r(RPCCheck,D1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20Windo


SF:ws2000/0\.0\x20UPnP/1\.0\x20PhilipsIntelSDK/1\.4\x20DLNADOC/1\.50\r\nCO


SF:NNECTION:\x20close\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/ht

SF:ml\r\n\r\n<html><body><h1>400\x20Bad\x20Request</h1></body></html>")%r(
SF:FourOhFourRequest,CD,"HTTP/1\.1\x20404\x20Not\x20Found\r\nSERVER:\x20Wi
SF:ndows2000/0\.0\x20UPnP/1\.0\x20PhilipsIntelSDK/1\.4\x20DLNADOC/1\.50\r\
SF:nCONNECTION:\x20close\r\nCONTENT-LENGTH:\x2048\r\nCONTENT-TYPE:\x20text
SF:/html\r\n\r\n<html><body><h1>404\x20Not\x20Found</h1></body></html>");
MAC Address: 18:8E:D5:E7:2D:F6 (Philips Innovative Application NV )
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:kernel:2.6
OS details: Linux 2.6.9 - 2.6.31
Uptime guess: 0.253 days (since Thu Sep 27 17:23:51 2012)
Network Distance: 1 hop


TCP Sequence Prediction: Difficulty=200 (Good luck!)


IP ID Sequence Generation: All zeros

TRACEROUTE

HOP RTT     ADDRESS
1   4.31 ms 10.0.0.38


NSE: Script Post-scanning.
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ 
Nmap done: 1 IP address (1 host up) scanned in 143.12 seconds
           Raw packets sent: 65555 (2.885MB) | Rcvd: 65553 (2.623MB)

Post Reply

Return to “General”