Re: is there a way to root/hack T23a750 ?
Posted: Sat Nov 12, 2011 11:00 am
What is this? monitor?
Aha.. Link to firmware is here.
Probably it is hackable like other D series arm devices...
Edit: Decrypted using samygo patcher 0.30
Image:
We don`t have any D series rooted monitor here. Even don`t know much about those. But probably you could get console over ExLink... and start research it. With help of us.
Aha.. Link to firmware is here.
Probably it is hackable like other D series arm devices...
Edit: Decrypted using samygo patcher 0.30

Code: Select all
C:\tmp>C:\tmp\SamyGO.py decrypt_all ./T-GASMDEUC
SamyGO Firmware Patcher v0.30 Alpha (c) 2010-2011 Erdem U. Altinyurt
-=BIG FAT WARNING!=-
You can brick your TV with this tool!
Authors accept no responsibility about ANY DAMAGE on your devices!
project home: http://www.SamyGO.tv
Firmware: T-GASMDEUC v1006.1
AES Encrytped CI+ firmware detected.
Processing file appext.img.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0x74E5195B
CRC Validation passed
Processing file exe.img.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0x38283C3B
CRC Validation passed
Processing file Image.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0xFF2F577
CRC Validation passed
Processing file rootfs.img.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0x72723E59
CRC Validation passed
Processing file T-GENMDEUS1.bin.sec
secret key : SHWJUH:xxxx
Decrypting AES...
Decrypting with XOR Key : T-GASMDEUC
Crypto package found, using fast XOR engine.
Calculated CRC : 0x2CA075D0
Traceback (most recent call last):
File "C:\tmp\SamyGO.py", line 1207, in <module>
DecryptAll( sys.argv[2] )
File "C:\tmp\SamyGO.py", line 1020, in DecryptAll
ValidCRC = int(ValidCRC[CRCstart:CRCstart+8], 16)
ValueError: invalid literal for int() with base 16: '283c3b*0'
C:\tmp>
Code: Select all
Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F
00000020 4C 69 6E 75 78 2D 32 2E 36 2E 33 30 2E 39 00 00 Linux-2.6.30.9