samyGOso (.so injection - patching exeDSP/exeAPP)

Here are software that related with Samsung F series TVs.

johnbrade
SamyGO Project Donor
Posts: 36
Joined: Sun Mar 13, 2016 10:22 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by johnbrade » Wed Mar 16, 2016 8:41 am

Hello
I extract archive and overwrite samyGOso file to /mnt/opt/privateer/usr/bin
But I can not execute the following command. I need your help please.

Code: Select all

chmod +x /mnt/opt/privateer/usr/bin/samyGOso

User avatar
juusso
SamyGO Moderator
Posts: 9755
Joined: Sun Mar 07, 2010 6:20 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by juusso » Wed Mar 16, 2016 8:44 am

What output do you get after this command?
LE40B653T5W,UE40D6750
Have questions? Read SamyGO Wiki, Search on forum first!
FFB (v0.8), FFB for CI+ . Get root on: C series, D series, E series, F series, H series, exeDSP/exeTV patches[C/D/E/F/H]

DO NOT EVER INSTALL FIRMWARE UPGRADE

johnbrade
SamyGO Project Donor
Posts: 36
Joined: Sun Mar 13, 2016 10:22 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by johnbrade » Wed Mar 16, 2016 8:51 am

I have this:

Code: Select all

John-MBP:~ John$ nc 192.168.188.29 3123
/bin/sh: can't access tty; job control turned off
/dtv $ chmod +x /mnt/opt/privateer/usr/bin/samyGOso
chmod: /mnt/opt/privateer/usr/bin/samyGOso: Operation not permitted
/dtv $ 


sectroyer
Official SamyGO Developer
Posts: 5641
Joined: Wed May 04, 2011 5:10 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by sectroyer » Wed Mar 16, 2016 9:45 am

NOT full root :). Run whoami and you will notice.
I do NOT support "latest fw" at ALL. If you have one you should block updates on router and wait for it to STOP being "latest":)
If you want me to help you please paste FULL log(s) to "spoiler"/"code" bbcodes or provide link(s) to pasted file(s) on http://ctrlv.it/ Otherwise "NO HELP"!!!
If you want root DISABLE internet access to your device!!!!
DO NOT EVER INSTALL FIRMWARE UPGRADE !!!!

johnbrade
SamyGO Project Donor
Posts: 36
Joined: Sun Mar 13, 2016 10:22 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by johnbrade » Wed Mar 16, 2016 9:52 am

What is whoami?

User avatar
juusso
SamyGO Moderator
Posts: 9755
Joined: Sun Mar 07, 2010 6:20 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by juusso » Wed Mar 16, 2016 9:54 am

You can do chmod 755 instead of chmod +x
LE40B653T5W,UE40D6750
Have questions? Read SamyGO Wiki, Search on forum first!
FFB (v0.8), FFB for CI+ . Get root on: C series, D series, E series, F series, H series, exeDSP/exeTV patches[C/D/E/F/H]

DO NOT EVER INSTALL FIRMWARE UPGRADE

User avatar
juusso
SamyGO Moderator
Posts: 9755
Joined: Sun Mar 07, 2010 6:20 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by juusso » Wed Mar 16, 2016 9:55 am

whoami is command you have to enter and post output here.

Code: Select all

whoami
LE40B653T5W,UE40D6750
Have questions? Read SamyGO Wiki, Search on forum first!
FFB (v0.8), FFB for CI+ . Get root on: C series, D series, E series, F series, H series, exeDSP/exeTV patches[C/D/E/F/H]

DO NOT EVER INSTALL FIRMWARE UPGRADE

johnbrade
SamyGO Project Donor
Posts: 36
Joined: Sun Mar 13, 2016 10:22 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by johnbrade » Wed Mar 16, 2016 10:00 am

That is what I have after running whoami:

Code: Select all

John-MBP:~ John$ nc 192.168.188.29 3123
/bin/sh: can't access tty; job control turned off
/dtv $ whoami
app
/dtv $ 

sectroyer
Official SamyGO Developer
Posts: 5641
Joined: Wed May 04, 2011 5:10 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by sectroyer » Wed Mar 16, 2016 10:17 am

superb :) samyGOso should NOT work :) run:
ps aux
I do NOT support "latest fw" at ALL. If you have one you should block updates on router and wait for it to STOP being "latest":)
If you want me to help you please paste FULL log(s) to "spoiler"/"code" bbcodes or provide link(s) to pasted file(s) on http://ctrlv.it/ Otherwise "NO HELP"!!!
If you want root DISABLE internet access to your device!!!!
DO NOT EVER INSTALL FIRMWARE UPGRADE !!!!

johnbrade
SamyGO Project Donor
Posts: 36
Joined: Sun Mar 13, 2016 10:22 pm

Re: samyGOso (.so injection - patching exeDSP/exeAPP)

Post by johnbrade » Wed Mar 16, 2016 10:30 am

I run ps aux and have This:

Code: Select all

/dtv $ ps aux
PID   USER     TIME   COMMAND
    1 root       0:00 init
    2 root       0:00 [kthreadd]
    3 root       0:01 [ksoftirqd/0]
    5 root       0:00 [kworker/0:0H]
    7 root       0:00 [kworker/u:0H]
    8 root       0:00 [migration/0]
    9 root       0:40 [rcu_preempt]
   10 root       0:00 [rcu_bh]
   11 root       0:00 [rcu_sched]
   12 root       0:00 [ksoftirqd/1]
   13 root       0:00 [migration/1]
   14 root       0:00 [kworker/1:0]
   15 root       0:00 [kworker/1:0H]
   16 root       0:00 [ksoftirqd/2]
   17 root       0:00 [migration/2]
   18 root       0:00 [kworker/2:0]
   19 root       0:00 [kworker/2:0H]
   20 root       0:00 [ksoftirqd/3]
   21 root       0:00 [migration/3]
   22 root       0:00 [kworker/3:0]
   23 root       0:00 [kworker/3:0H]
   24 root       0:00 [khelper]
   30 root       0:00 [bdi-default]
   31 root       0:00 [kblockd]
   36 root       0:00 [sdp_spid00]
   40 root       0:00 [kdtvlogd]
   41 root       0:01 [kswapd0]
   46 root       0:00 [vdbinder]
   47 root       0:00 [deferwq]
   48 root       0:00 [10090cdc.tmu]
   49 root       0:00 [sdptmu-pm]
   51 root       0:01 [kworker/3:1]
   52 root       0:21 [mmcqd/0]
   53 root       0:00 [mmcqd/0boot0]
   54 root       0:00 [mmcqd/0boot1]
   55 root       0:00 [mmcqd/0rpmb]
   56 root       0:00 [swapper/0]
   58 root       0:00 [kworker/1:1]
   59 root       0:10 [kworker/2:1]
   68 root       0:00 -/bin/sh
   81 root       0:00 [kworker/3:1H]
   85 root       0:00 [kworker/2:1H]
   89 root       0:00 [kworker/1:1H]
  117 root       0:00 /bin/sh /mtd_exe/rc.local
  119 root       0:00 [kworker/0:1H]
  122 app        0:30 /mtd_exe/WidgetEngine/WidgetEngine
  127 root       0:00 ./servicemanager_csp -vdbinder
  133 root       0:00 [dvfs_dev]
  142 root       0:09 /mtd_exe/Comp_LIB/SecurityFramework/SFCore
  153 root       0:00 [khubd]
  161 root       0:00 {exe} ash /mtd_exe/launch_exeAPP.sh
  162 app       36:45 /mtd_exe/exeTV -vdbinder
  163 app       25:49 /mtd_exe/exeAPP -vdbinder
  176 root       0:00 [cfg80211]
  256 root       0:00 [ath6kl]
  260 root       0:00 [aeMsgTaskMP0]
  278 root       2:19 /mtd_exe/Runtime/bin/X -vdbinder -logfile /mtd_rwarea/Xlog.txt -modulepath /mtd_appdata/Runtime/XorgLibs -config /mtd_appdata/Runtime/bin/xorg.conf -sharevts -viewNumber 0
  288 app        0:24 Compositor -vdbinder
  439 app        0:16 /mtd_cmmlib/WIFI_LIB/QCA/wpa_supplicant -Dnl80211 -ip2p0 -c/mtd_rwarea/network/p2p_dual.conf -N -Dnl80211 -iwlan0 -c/mtd_rwarea/network/wpa_sta.conf -e /mtd_rwarea/network/entropy.dat -t -qq -O /tmp/wpa_supplicant
  476 root       0:00 [bat_events]
  484 root       0:22 /mtd_exe/Network/SNAP -s -c -t 2 -D
  581 app        0:08 /mtd_cmmlib/BT_LIB/bsa_server -all=0 -diag=0 -hci=0 -l2c=0 -app=0 -btm=0 -sdp=0 -rfc=0 -gap=0 -a2d=0 -avdt=0 -avrc=0 -mca=0 -d /dev/btusb0 -u /dtv/
  788 app        0:00 /mtd_exe/Comp_LIB/MrsAgent
  825 root       0:00 [flush-179:0]
  832 root       0:00 [loop0]
  847 root       0:00 [loop1]
  869 app        2:24 /mtd_exe/moip/exeCamera -vdbinder
 1161 root       0:00 [loop4]
 1338 app        0:00 [sh]
 1344 app        0:29 /mtd_exe/Webkit/WebKitWebProcess 122:WE 21
 1345 app        0:00 [sh]
 1360 root       0:00 [loop253]
 1361 root       0:00 [loop252]
 1362 app        1:10 {BrowserLauncher} a98ee548 
 1506 root       0:00 [scsi_eh_0]
 1507 root       0:04 [usb-storage]
 1508 root       0:00 [scsi_eh_1]
 1509 root       0:00 [usb-storage]
 1521 app        0:04 /mtd_down/emps/empWebBrowser_Execute/bin/WebKitWebProcess 1362:WB 44
 1523 app        0:01 /mtd_down/emps/empWebBrowser_Execute/bin/WebKitGPUProcess 1362:WB 40
 1577 root       0:00 [loop251]
 1581 root       0:02 [scsi-poller]
 1652 app        0:04 /mtd_exe/Webkit/WebKitPluginProcess 122:WE 31 /mtd_exe/Webkit/plugins/libSefPlugin.so
 1654 root       0:00 [jbd2/sda2-8]
 1655 root       0:00 [ext4-dio-unwrit]
 1794 root       0:00 [loop100]
 1889 app        0:00 sh -c /bin/sh /mtd_rwcommon/moip/engines/Skype/runSamyGO.sh
 1891 app        0:00 /bin/sh /mtd_rwcommon/moip/engines/Skype/runSamyGO.sh
 1908 app        9:24 /dtv/bin/samygo_telnetd 3123
 1909 app        0:00 /dtv/bin/busybox nc -l -p 3023 -e /bin/sh
 1917 root       0:00 /tmp/bin/getroot 6 /bin/sh /dtv/usb/sdb1/SamyGO/run.sh '/dtv/usb/sdb1'
 2020 root       0:00 /dtv/samygo_telnetd 33
 2028 root       0:00 /tmp/bin/busybox tcpsvd -vE 0.0.0.0 21 /tmp/bin/busybox ftpd -w /
 2051 root       0:01 [loop3]
 2053 root       0:00 [jbd2/loop3-8]
 2054 root       0:00 [ext4-dio-unwrit]
 2133 app        0:01 /mtd_exe/WebServerApp/bin/lighttpd -D -k 951492F04D31EB802C2724ABE8C811FF5D02B4668FD5C4C71730FE90615559D3  -f /mtd_exe/WebServerApp/webserver/lighttpd.conf -s
 2157 app        0:00 /mtd_cmmlib/Network/udhcpc -i br -t 5 -T 5 -V udhcpc1.21.1 -b -s /mtd_cmmlib/Network/default.script
 2277 root       0:00 /mnt/bin/busybox2 telnetd -p 23 -l /mnt/bin/ash
 2303 root       0:00 dropbear
 2326 root       0:00 [file-storage]
 2330 root       0:00 [scsi_eh_2]
 2331 root       0:00 [usb-storage]
 2431 root       0:00 [crypto]
 2454 root       0:00 [cifsiod]
 2590 root       0:03 httpd -f /mnt/etc/apache2/httpd.conf -D PHP5CGI
 2601 root       0:00 httpd -f /mnt/etc/apache2/httpd.conf -D PHP5CGI
 2602 root       0:00 httpd -f /mnt/etc/apache2/httpd.conf -D PHP5CGI
 2603 root       0:00 httpd -f /mnt/etc/apache2/httpd.conf -D PHP5CGI
 2604 root       0:00 httpd -f /mnt/etc/apache2/httpd.conf -D PHP5CGI
 2605 root       0:00 httpd -f /mnt/etc/apache2/httpd.conf -D PHP5CGI
 2633 app        0:39 /mtd_exe/nodejs/nodeEngine/node --expose-gc --gc_global --stack_trace_limit=0 --nouse-idle-notification --max-old-space-size=512 --max-new-space-size=2048 /mtd_rocommon/nodejs/wasp-framework/dwsFramework.js
 2964 app        0:00 [sh]
 4726 app        0:00 [sh]
 4979 app        0:00 [sh]
 7071 root       0:04 [kworker/u:1]
 7991 root       0:02 [kworker/u:0]
 7994 root       0:10 [kworker/0:1]
 8168 app        0:03 /mtd_exe/Webkit/WebKitGPUProcess 122:WE 39
 8603 app        0:00 [sh]
 8647 app        0:00 /bin/sh -i
 9874 root       0:06 [kworker/0:0]
10460 root       0:00 [flush-8:16]
10461 root       0:00 [flush-7:3]
10462 root       0:00 [flush-8:32]
10463 root       0:00 [flush-8:0]
10536 app        0:00 ps aux
/dtv $ 

Post Reply

Return to “[F] Software”