Search found 119 matches

by timoo
Tue May 12, 2015 6:58 pm
Forum: [F] Firmware
Topic: Decrypting F Series Firmware Updates...
Replies: 20
Views: 49037

Re: Decrypting F Series Firmware Updates...

zoelechat wrote:What do you need exactly? exeAPP+exeTV (=exeDSP)? MST? non-MST?
i need everything you could post for probabbly non-MST (T-FXPDEUC???) ;) or other if you dont have ,thnx
by timoo
Tue May 12, 2015 4:21 pm
Forum: [F] Firmware
Topic: Decrypting F Series Firmware Updates...
Replies: 20
Views: 49037

Re: Decrypting F Series Firmware Updates...

hi ,for my developer purposes (idont have F tv :( ) i am looking for some F series firmware dumps i prefer arm(my samsung C tv have arm) because of ida+hexarm decompiler :D if somebody want to share with me pm me link ;) thnx
by timoo
Mon May 11, 2015 6:04 pm
Forum: [C] Software
Topic: [Tutorial] Reverse Engineering C series
Replies: 31
Views: 65228

Re: [Tutorial] Reverse Engineering C series

sectroyer:
no problem :)
btw> do you know FW where have authuld some "symbols" ?
by timoo
Wed Apr 22, 2015 2:11 pm
Forum: [C] Software
Topic: [Tutorial] Reverse Engineering C series
Replies: 31
Views: 65228

Re: [Tutorial] Reverse Engineering C series

there is no problem using these 'symbols' on another fw just make signatures or use bindiff :)
by timoo
Tue Apr 21, 2015 10:05 pm
Forum: [C] Software
Topic: [Tutorial] Reverse Engineering C series
Replies: 31
Views: 65228

Re: [Tutorial] Reverse Engineering C series

decrypt use this http://sourceforge.net/p/samygo/code/HE ... Patcher.py
then exe.img is fat16 image mount in linux and extract exedsp :)
by timoo
Tue Apr 21, 2015 9:04 pm
Forum: [C] Software
Topic: [Tutorial] Reverse Engineering C series
Replies: 31
Views: 65228

Re: [Tutorial] Reverse Engineering C series

t-valdeuc 0000 is downgrade fw already on wiki -> http://wiki.samygo.tv/index.php5/How_to ... C_firmware
in t-valdeuc 1XXX fw are some function names too at least 1008.3 :)
by timoo
Tue Apr 21, 2015 6:25 pm
Forum: [C] Software
Topic: [Tutorial] Reverse Engineering C series
Replies: 31
Views: 65228

Re: [Tutorial] Reverse Engineering C series

imho at least fw T-valdeuc 0000 have these 'symbols' - function names etc. of course there is no debug symbols both are striped on arm and mips - tested mips fw T-MSX6DEUC_2001.0
by timoo
Sun Apr 19, 2015 7:29 am
Forum: [C] Software
Topic: [Tutorial] Reverse Engineering C series
Replies: 31
Views: 65228

Re: [Tutorial] Reverse Engineering C series

Confirmed. I was able to find functions in same places :) Just in one window I open C MIPS find function copy name and in second window I find same place in C ARM rename some "sub_xxxxx" to correct name and voila :) Of course you still have to make it dynamic but that's another storry ;) ...
by timoo
Tue Oct 01, 2013 4:23 pm
Forum: [F] Firmware
Topic: Decrypting F Series Firmware Updates...
Replies: 20
Views: 49037

Re: Decompilation firmware Samsung F Series

robert wrote:What tool did you use to decompile the upgrade.msd file?
output of binwalk IMHO :)
by timoo
Wed Jun 27, 2012 9:59 pm
Forum: General
Topic: libpng exploit
Replies: 3
Views: 2882

Re: libpng exploit

i have no problem with debuggin my tv ue40c8000(IDA+ gdbserver on TV, gdb over ssh works too ) i am working on vulnerable .png which crash libpng -> no exploit for now -> i think i could do that because we have souce code of libpng and possible dump of C,D,E firmware , hard part is only write exploi...

Go to advanced search