i need everything you could post for probabbly non-MST (T-FXPDEUC???) or other if you dont have ,thnxzoelechat wrote:What do you need exactly? exeAPP+exeTV (=exeDSP)? MST? non-MST?
Search found 119 matches
- Tue May 12, 2015 6:58 pm
- Forum: [F] Firmware
- Topic: Decrypting F Series Firmware Updates...
- Replies: 20
- Views: 50286
Re: Decrypting F Series Firmware Updates...
- Tue May 12, 2015 4:21 pm
- Forum: [F] Firmware
- Topic: Decrypting F Series Firmware Updates...
- Replies: 20
- Views: 50286
Re: Decrypting F Series Firmware Updates...
hi ,for my developer purposes (idont have F tv ) i am looking for some F series firmware dumps i prefer arm(my samsung C tv have arm) because of ida+hexarm decompiler if somebody want to share with me pm me link thnx
- Mon May 11, 2015 6:04 pm
- Forum: [C] Software
- Topic: [Tutorial] Reverse Engineering C series
- Replies: 31
- Views: 66657
Re: [Tutorial] Reverse Engineering C series
sectroyer:
no problem
btw> do you know FW where have authuld some "symbols" ?
no problem
btw> do you know FW where have authuld some "symbols" ?
- Wed Apr 22, 2015 2:11 pm
- Forum: [C] Software
- Topic: [Tutorial] Reverse Engineering C series
- Replies: 31
- Views: 66657
Re: [Tutorial] Reverse Engineering C series
there is no problem using these 'symbols' on another fw just make signatures or use bindiff
- Tue Apr 21, 2015 10:05 pm
- Forum: [C] Software
- Topic: [Tutorial] Reverse Engineering C series
- Replies: 31
- Views: 66657
Re: [Tutorial] Reverse Engineering C series
decrypt use this http://sourceforge.net/p/samygo/code/HE ... Patcher.py
then exe.img is fat16 image mount in linux and extract exedsp
then exe.img is fat16 image mount in linux and extract exedsp
- Tue Apr 21, 2015 9:04 pm
- Forum: [C] Software
- Topic: [Tutorial] Reverse Engineering C series
- Replies: 31
- Views: 66657
Re: [Tutorial] Reverse Engineering C series
t-valdeuc 0000 is downgrade fw already on wiki -> http://wiki.samygo.tv/index.php5/How_to ... C_firmware
in t-valdeuc 1XXX fw are some function names too at least 1008.3
in t-valdeuc 1XXX fw are some function names too at least 1008.3
- Tue Apr 21, 2015 6:25 pm
- Forum: [C] Software
- Topic: [Tutorial] Reverse Engineering C series
- Replies: 31
- Views: 66657
Re: [Tutorial] Reverse Engineering C series
imho at least fw T-valdeuc 0000 have these 'symbols' - function names etc. of course there is no debug symbols both are striped on arm and mips - tested mips fw T-MSX6DEUC_2001.0
- Sun Apr 19, 2015 7:29 am
- Forum: [C] Software
- Topic: [Tutorial] Reverse Engineering C series
- Replies: 31
- Views: 66657
Re: [Tutorial] Reverse Engineering C series
Confirmed. I was able to find functions in same places :) Just in one window I open C MIPS find function copy name and in second window I find same place in C ARM rename some "sub_xxxxx" to correct name and voila :) Of course you still have to make it dynamic but that's another storry ;) ...
- Tue Oct 01, 2013 4:23 pm
- Forum: [F] Firmware
- Topic: Decrypting F Series Firmware Updates...
- Replies: 20
- Views: 50286
Re: Decompilation firmware Samsung F Series
output of binwalk IMHOrobert wrote:What tool did you use to decompile the upgrade.msd file?
- Wed Jun 27, 2012 9:59 pm
- Forum: General
- Topic: libpng exploit
- Replies: 3
- Views: 2890
Re: libpng exploit
i have no problem with debuggin my tv ue40c8000(IDA+ gdbserver on TV, gdb over ssh works too ) i am working on vulnerable .png which crash libpng -> no exploit for now -> i think i could do that because we have souce code of libpng and possible dump of C,D,E firmware , hard part is only write exploi...