Page 1 of 3
exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120308
Posted: Thu Mar 15, 2012 9:08 pm
by arris69
Re: exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120
Posted: Thu Mar 15, 2012 9:19 pm
by juusso
Little by little

Re: exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120
Posted: Thu Mar 15, 2012 9:28 pm
by arris69
juuso wrote:Little by little

sorry, forgot the original link:
http://www.samsung.com/us/support/owner ... ES8000FXZA
Re: exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120
Posted: Fri Mar 16, 2012 1:49 am
by prairie
Do you have secret key to share for T-ECPAKUC?
Re: exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120
Posted: Fri Mar 16, 2012 9:15 am
by arris69
prairie wrote:Do you have secret key to share for T-ECPAKUC?
there is no key here, this time we didn't needed to search and try around. nice tehnician did some hardware stuff like
this.
Re: exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120
Posted: Mon May 14, 2012 12:13 pm
by nobody
lol! you are so funny!
Re: exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120
Posted: Mon May 28, 2012 10:58 am
by maxprasak
arris69 wrote:prairie wrote:Do you have secret key to share for T-ECPAKUC?
there is no key here, this time we didn't needed to search and try around. nice tehnician did some hardware stuff like
this.
So can we decrypt ES firmware or not ???
Re: exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120
Posted: Mon May 28, 2012 1:24 pm
by arris69
maxprasak wrote:...
So can we decrypt ES firmware or not ???
it was a dump of the mmc-chip -> already decrypted during software update. -> no need to decrypt it
but what you need from the firmware?
Re: exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120
Posted: Mon May 28, 2012 4:34 pm
by maxprasak
arris69 wrote:it was a dump of the mmc-chip -> already decrypted during software update. -> no need to decrypt it
Aha, good job !
arris69 wrote:but what you need from the firmware?
I think this question is probably useless there at somygo forum
Generally I want to look how it works and if I can help us to bring that to be more useful for masses...

Re: exeDSP from SWU_T-ECPAKUC_001012_I03_ES000KS000RS000_120
Posted: Mon May 28, 2012 4:55 pm
by juusso
maxprasak wrote:Generally I want to look how it works and if I can help us to bring that to be more useful for masses...

Then you came to right place
Power on IDA and feed the decrypted exeDSP for it. Reverse engineering is the only way to make something usefull (except geting root and use comon linux features like nfs and samba mou nts et cetera.)
Firtst goal - to execute arbitrary code, get shell access.
Second and all further - depends from requests and imagination.
What i did if i was you - checked methods who already works on D series... like widgets, unsigned games, some kind of channel import/export to different formatted usb dongles. Yes, most holes are closed, but i think if they
close one door, here should be another backdoor to get in
Not much for the beginning, but...