Re: .so injection
Posted: Sat Aug 31, 2013 6:53 am
emm, there is hijack_v2.tgz from 08.24. Have you forgotten to attach smth? 

Samsung TV Firmware on the GO
http://forum.samygo.tv/
Code: Select all
{ "_ZN14CViewerManager17ShowChannelBannerEbi", 0x00000000, 0x00000240, 0x00000260, 0xE3560000, 0xE35600FF, 0 }
Code: Select all
/tmp/samyGOso -d -l /tmp/test.so -n exeAPP
Code: Select all
/tmp/samyGOso -d -l /tmp/test.so -A
Code: Select all
/tmp/samyGOso -d -l /tmp/test.so -A -B
Code: Select all
# samyGOso
samyGOso v1.2.4 (c) bugficks 2013, sectroyer 2014
usage: samyGOso [-p PID | -n procname | -A | -T | -D ] [-B ] {-c CONFIG | -l /full/path/to/inject.so [-r (=resident)]} [-d (=debug on)] [-a (=add libc addressoffset )] [arg0,...,argN]
#
Code: Select all
_mandatory parameters:
__targeting (choose one of these parameters):
-p [PID] specifies target process by PID [decimal value] (old parameter, usually used like [i]-p `pidof exeDSP`[/i] to automatically get the right PID)
-n [procname] specifies target process by name of process
-A specifies "exeAPP" as target process name
-D specifies "exeDSP" as target process name
-T specifies "exeTV" as target process name
___optional additional targeting:
-B usable in combination with -A -T, sets "exeDSP" as fallback target (need more details here)
__source lib
-l [path to lib] specifies the lib*.so to be used
_optional parameters:
-r switch on resident mode, causes samyGOso to inject the libso in resident mode, depending on type of libso wether it's necessary
-d switch on debug mode, causes samyGOso to create a Logfile with debug output in /dtv (tmpfs, deleted at poweroff/reboot)
-a [0x#######] sets an addtess offset [?bit hex value], only use if you exactly know why (need more details here)
you may additionally add arguments to be passed to lib*.so to influence its behavior
Documenting stuff is always a good habitzoelechat wrote:Spoiled to 1st post. Anyway nearly everybody will deal with given syntax for a specific patch, without caring about samyGOso itself usage