Page 1 of 1

Philips 46PFL4007 Smart TV

Posted: Mon Oct 22, 2012 2:26 pm
by coolrecep
Hi guys, long time no see :) Since sony took the 52LX900 review TV, I have bought myself a Philips 42PFL4007 smart tv. It has 3.5mm service port. So, I think it is a good place to start with. Also here is the latest FW. Can you guys run some tools on it?

http://www.p4c.philips.com/cgi-bin/dcbi ... k_Software

Thnaks.

And also this is the NMAP result:

Code: Select all

Starting Nmap 6.01 ( http://nmap.org ) at 2012-09-27 23:26 T?rkiye Yaz Saati


NSE: Loaded 93 scripts for scanning.


NSE: Script Pre-scanning.


Initiating ARP Ping Scan at 23:26


Scanning 10.0.0.38 [1 port]


Completed ARP Ping Scan at 23:26, 0.27s elapsed (1 total hosts)


Initiating Parallel DNS resolution of 1 host. at 23:26


Completed Parallel DNS resolution of 1 host. at 23:26, 2.51s elapsed


Initiating SYN Stealth Scan at 23:26


Scanning 10.0.0.38 [65535 ports]


Discovered open port 49153/tcp on 10.0.0.38


Discovered open port 1925/tcp on 10.0.0.38


Discovered open port 2323/tcp on 10.0.0.38


Completed SYN Stealth Scan at 23:26, 10.73s elapsed (65535 total ports)


Initiating Service scan at 23:26


Scanning 3 services on 10.0.0.38


Service scan Timing: About 33.33% done; ETC: 23:30 (0:02:32 remaining)


Service scan Timing: About 66.67% done; ETC: 23:29 (0:00:53 remaining)


Completed Service scan at 23:28, 126.39s elapsed (3 services on 1 host)


Initiating OS detection (try #1) against 10.0.0.38


NSE: Script scanning 10.0.0.38.


Initiating NSE at 23:28


Completed NSE at 23:28, 0.02s elapsed


Nmap scan report for 10.0.0.38


Host is up (0.0043s latency).


Not shown: 65532 closed ports


PORT      STATE SERVICE  VERSION


1925/tcp  open  unknown


2323/tcp  open  3d-nfsd?


49153/tcp open  unknown


2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :


==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============


SF-Port1925-TCP:V=6.01%I=7%D=9/27%Time=5064B679%P=i686-pc-windows-windows%


SF:r(GetRequest,153,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\nAcc


SF:ess-Control-Allow-Origin:\x20\*\r\nCache-Control:\x20no-cache\r\nConten


SF:t-type:\x20text/html;\x20charset=utf-8\r\nDate:\x20Thu,\x2027\x20Sep\x2


SF:02012\x2020:26:31\x20GMT\r\n\r\n<html>\r\n<head><title>JointSpace</titl


SF:e></head>\r\n<body>\r\n\x20\x20\x20\x20<h1>Welcome\x20to\x20JointSpace<


SF:/h1>\r\n\x20\x20\x20\x20<h2><a\x20href=\"1/doc/API\.html\">API\x20refer


SF:ence</a></h2>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,117,"HTTP/1\.0\


SF:x20405\x20Method\x20Not\x20Allowed\r\nContent-Length:\x2090\r\nAccess-C


SF:ontrol-Allow-Origin:\x20\*\r\nCache-Control:\x20no-cache\r\nContent-typ


SF:e:\x20text/html;\x20charset=utf-8\r\nDate:\x20Thu,\x2027\x20Sep\x202012


SF:\x2020:26:31\x20GMT\r\n\r\n<html><head><title>Method\x20not\x20allowed<


SF:/title></head><body>Method\x20not\x20allowed</body></html>")%r(RTSPRequ


SF:est,117,"HTTP/1\.1\x20405\x20Method\x20Not\x20Allowed\r\nContent-Length


SF::\x2090\r\nAccess-Control-Allow-Origin:\x20\*\r\nCache-Control:\x20no-c


SF:ache\r\nContent-type:\x20text/html;\x20charset=utf-8\r\nDate:\x20Thu,\x


SF:2027\x20Sep\x202012\x2020:26:31\x20GMT\r\n\r\n<html><head><title>Method


SF:\x20not\x20allowed</title></head><body>Method\x20not\x20allowed</body><


SF:/html>")%r(FourOhFourRequest,FC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nCo


SF:ntent-Length:\x2072\r\nAccess-Control-Allow-Origin:\x20\*\r\nCache-Cont


SF:rol:\x20no-cache\r\nContent-type:\x20text/html;\x20charset=utf-8\r\nDat


SF:e:\x20Thu,\x2027\x20Sep\x202012\x2020:26:57\x20GMT\r\n\r\n<html><head><


SF:title>Not\x20Found</title></head><body>Not\x20Found</body></html>")%r(S


SF:IPOptions,117,"HTTP/1\.1\x20405\x20Method\x20Not\x20Allowed\r\nContent-


SF:Length:\x2090\r\nAccess-Control-Allow-Origin:\x20\*\r\nCache-Control:\x


SF:20no-cache\r\nContent-type:\x20text/html;\x20charset=utf-8\r\nDate:\x20


SF:Thu,\x2027\x20Sep\x202012\x2020:27:07\x20GMT\r\n\r\n<html><head><title>


SF:Method\x20not\x20allowed</title></head><body>Method\x20not\x20allowed</


SF:body></html>");


==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============


SF-Port49153-TCP:V=6.01%I=7%D=9/27%Time=5064B67E%P=i686-pc-windows-windows


SF:%r(GetRequest,CD,"HTTP/1\.1\x20404\x20Not\x20Found\r\nSERVER:\x20Window


SF:s2000/0\.0\x20UPnP/1\.0\x20PhilipsIntelSDK/1\.4\x20DLNADOC/1\.50\r\nCON


SF:NECTION:\x20close\r\nCONTENT-LENGTH:\x2048\r\nCONTENT-TYPE:\x20text/htm


SF:l\r\n\r\n<html><body><h1>404\x20Not\x20Found</h1></body></html>")%r(HTT


SF:POptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nSERVER:\x20Windo


SF:ws2000/0\.0\x20UPnP/1\.0\x20PhilipsIntelSDK/1\.4\x20DLNADOC/1\.50\r\nCO


SF:NNECTION:\x20close\r\nCONTENT-LENGTH:\x2054\r\nCONTENT-TYPE:\x20text/ht


SF:ml\r\n\r\n<html><body><h1>501\x20Not\x20Implemented</h1></body></html>"


SF:)%r(RPCCheck,D1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSERVER:\x20Windo


SF:ws2000/0\.0\x20UPnP/1\.0\x20PhilipsIntelSDK/1\.4\x20DLNADOC/1\.50\r\nCO


SF:NNECTION:\x20close\r\nCONTENT-LENGTH:\x2050\r\nCONTENT-TYPE:\x20text/ht

SF:ml\r\n\r\n<html><body><h1>400\x20Bad\x20Request</h1></body></html>")%r(
SF:FourOhFourRequest,CD,"HTTP/1\.1\x20404\x20Not\x20Found\r\nSERVER:\x20Wi
SF:ndows2000/0\.0\x20UPnP/1\.0\x20PhilipsIntelSDK/1\.4\x20DLNADOC/1\.50\r\
SF:nCONNECTION:\x20close\r\nCONTENT-LENGTH:\x2048\r\nCONTENT-TYPE:\x20text
SF:/html\r\n\r\n<html><body><h1>404\x20Not\x20Found</h1></body></html>");
MAC Address: 18:8E:D5:E7:2D:F6 (Philips Innovative Application NV )
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:kernel:2.6
OS details: Linux 2.6.9 - 2.6.31
Uptime guess: 0.253 days (since Thu Sep 27 17:23:51 2012)
Network Distance: 1 hop


TCP Sequence Prediction: Difficulty=200 (Good luck!)


IP ID Sequence Generation: All zeros

TRACEROUTE

HOP RTT     ADDRESS
1   4.31 ms 10.0.0.38


NSE: Script Post-scanning.
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ 
Nmap done: 1 IP address (1 host up) scanned in 143.12 seconds
           Raw packets sent: 65555 (2.885MB) | Rcvd: 65553 (2.623MB)