Page 18 of 24

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Wed Jul 26, 2017 10:59 pm
by zoelechat
ulster444 wrote: Wed Jul 26, 2017 10:40 pm Where we are?:)
Into headless-armless-footless (at least) read-only world where it's not always easy to apply known recipes...
Glad it worked anyway :)

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Thu Aug 24, 2017 9:30 am
by Marflow
You must permanently block TV access to https://osb-apps.samsungqbe.com
My router TP-Link TL-WR841N v8 can't block https urls. :(
Solution? Install Gargoyle v1.6.2.2 now he can. :)

go to /etc/dnsmasq.conf add the sites:
SpoilerShow

Code: Select all

address=/msecnd.net/127.0.0.1
address=/.msecnd.net/127.0.0.1

address=/samsungotn.net/127.0.0.1
address=/.samsungotn.net/127.0.0.1

address=/samsungqbe.com/127.0.0.1
address=/.samsungqbe.com/127.0.0.1

address=/samsungads.com/127.0.0.1
address=/.samsungads.com/127.0.0.1

address=/osb-apps.samsungqbe.com/127.0.0.1
address=/.osb-apps.samsungqbe.com/127.0.0.1

address=/test.samsungotn.net/127.0.0.1
address=/.test.samsungotn.net/127.0.0.1

address=/otn.samsungcloudcdn.com/127.0.0.1
address=/.otn.samsungcloudcdn.com/127.0.0.1

address=/samsungcloudsolution.net/127.0.0.1
address=/.samsungcloudsolution.net/127.0.0.1
To close the Bypass, go to /etc/firewall.user and add these lines in this file:

Code: Select all

iptables -t nat -I PREROUTING -p tcp --dport 53 -j REDIRECT --to-ports 53
iptables -t nat -I PREROUTING -p udp --dport 53 -j REDIRECT --to-ports 53

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Thu Aug 24, 2017 8:01 pm
by mehmethan
Question to firmware downgrade.
Do we loose root when we do a downgrade/update with this method? If not, Would that mean we could update to latest version?

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Thu Aug 24, 2017 8:51 pm
by zoelechat
You can up/downgrade at will as long as you stay <=1480. Above: root lost, irremediably :)

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Wed Nov 08, 2017 11:22 pm
by twisted89
@sectroyer any chance you could provide technical details on the payload used in the exploit? It'd be interesting to see if it can be applied to more modern java script exploits newer versions if the firmware are susceptible to.

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Wed Nov 22, 2017 11:43 am
by sectroyer
twisted89 wrote: Wed Nov 08, 2017 11:22 pm @sectroyer any chance you could provide technical details on the payload used in the exploit?
All is in code but you can ask :)
twisted89 wrote: Wed Nov 08, 2017 11:22 pm It'd be interesting to see if it can be applied to more modern java script exploits newer versions if the firmware are susceptible to.
No :)

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Fri Nov 24, 2017 8:42 pm
by smart_lover
sectroyer wrote: Thu Apr 13, 2017 8:58 pm This rooting method should be applicable to all T-HK* firmwares up to 1480. No need to continue reading (nor ask!) if you've got 1490
I successfully installed ROOT-J.wgt via your provided VM, And follow your instructions step by step without any luck!
I attached two picture, One of them is my service menu(my firmware version is T-HKMFKUABC 1160.6) screenshot and another is in my menu.
My question is why my TV has not Ticker option at all(menu -> Smart Hub -> Auto Start -> Ticker and select "ROOT-J")
It seems I have 'Autorun Smart Hub' and 'Autorun Last APP' instead. I already enable both of them without any luck.
How can I resolve it? Is it all about region limitations? How can I overcome it?

F.Y.I: My TV is not connected to the internet at all and I already have successfully rooted an E and H series TV.
smart2.jpg
smart1.jpg

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Fri Nov 24, 2017 9:13 pm
by zoelechat
It's K series, no point in trying J root :)

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Fri Nov 24, 2017 10:03 pm
by twisted89
sectroyer wrote: Wed Nov 22, 2017 11:43 am
twisted89 wrote: Wed Nov 08, 2017 11:22 pm @sectroyer any chance you could provide technical details on the payload used in the exploit?
All is in code but you can ask :)
twisted89 wrote: Wed Nov 08, 2017 11:22 pm It'd be interesting to see if it can be applied to more modern java script exploits newer versions if the firmware are susceptible to.
No :)
I'm talking about the binary blob, not the java script. Hard to tell exactly what it's doing without context. Seems to contain a couple of strings pointing to the USB stick and call some unknown functions in memory.

Re: [App] J ROOT on T-HK* fw up to 1480

Posted: Fri Nov 24, 2017 10:39 pm
by sectroyer
twisted89 wrote: Fri Nov 24, 2017 10:03 pm I'm talking about the binary blob, not the java script. Hard to tell exactly what it's doing without context. Seems to contain a couple of strings pointing to the USB stick and call some unknown functions in memory.
No point covering that as EXACTLY what's used there is patched in "newer fw" :) Won't get you anywhere :)