P. Stefopoulos2
P. Stefopoulos2
Research Project 1
Smart TV Hacking
January 2013
Nikos Sidiropoulos
Periklis Stefopoulos
Abstract
Modern TV technology demands a far more advanced and typical entertainment system. The
idea behind the Smart TV concept is the ability of this system to interact with the Internet.
However, the more Smart the TV is, the more network related services it provides, and the
more likely it is to be vulnerable to remote attacks. Given the above statement, we focused on
revealing these vulnerabilities and subsequently abusing them. Specifically, we managed to
perform an online firmware upgrade by impersonating Samsungs update servers. Additionally,
we discovered that the browsers TLS/SSL implementation was bad leading to a successful man
in the middle attack. Finally, we document all the other design flaws that were found, in terms of
security and formulate corresponding threat scenarios.
Acknowledgements
We would like to thank Henri Hambartsumyan, Daan Muller and Coen Steenbeek for their
support and valuable assistance throughout the research project.
Table of Contents
ABSTRACT ....................................................................................................................................................... 1
ACKNOWLEDGEMENTS ................................................................................................................................... 2
LIST OF FIGURES .............................................................................................................................................. 5
1 INTRODUCTION ............................................................................................................................................ 7
2 MATERIALS AND METHODS ......................................................................................................................... 9
2.1 MATERIALS ......................................................................................................................................................9
2.2 METHODS ......................................................................................................................................................10
3 VULNERABILITY ANALYSIS .......................................................................................................................... 11
3.1 FIRMWARE ATTACK .........................................................................................................................................11
3.1.1 Firmware Importance .........................................................................................................................11
3.1.2 About the Firmware ............................................................................................................................11
3.1.3 Vulnerability Assessment ....................................................................................................................12
3.1.4 Attack Procedure ................................................................................................................................16
3.2 BROWSER ATTACK ...........................................................................................................................................19
3.2.1 Browser Importance............................................................................................................................19
3.2.2 About the browser ..............................................................................................................................19
3.2.3 SSL/TLS background ............................................................................................................................19
3.2.4 Man in the Middle Attack (MiTM) ......................................................................................................20
3.2.5 Attack Procedure (SSL MiTM) .............................................................................................................21
3.3 MISCELLANEOUS ATTACKS ................................................................................................................................25
3.3.1 Samsung Apps .....................................................................................................................................25
LS_ROOT.LOG ....................................................................................................................................................... 44
NETSTAT.LOG ....................................................................................................................................................... 45
PS.LOG ................................................................................................................................................................ 47
DMESG.LOG ......................................................................................................................................................... 48
List Of Figures
Figure 1: Topology diagram ................................................................................................... 10
Figure 2 USB firmware files ................................................................................................... 12
Figure 3 USB decryption process ........................................................................................... 13
Figure 4 USB decrypted firmare ............................................................................................. 13
Figure 5 exe.img files ............................................................................................................. 14
Figure 6 /etc/rc.local ............................................................................................................... 14
Figure 7 Mounted rootfs.img .................................................................................................. 15
Figure 8 /bin ............................................................................................................................ 15
Figure 9: samsungotn.net certificate ....................................................................................... 16
Figure 10: Certificate Denial .................................................................................................. 17
Figure 11: Unsecure firmware update check ......................................................................... 17
Figure 12: Unsecure firmware download ............................................................................... 17
Figure 13: Local server update ............................................................................................... 18
Figure 14: Local firmware download ..................................................................................... 18
Figure 15: TLS/SSL ................................................................................................................ 20
Figure 16: TLS/SSL MiTM .................................................................................................... 20
Figure 17: Certificate example................................................................................................ 21
Figure 18: Burp Suite proxy ................................................................................................... 22
Figure 19: Decrypted HTTP GET message ............................................................................ 23
Figure 20: Facebook login page .............................................................................................. 23
Figure 21: Decrypted HTTP POST message .......................................................................... 24
Figure 22 Test2 app ................................................................................................................ 26
Figure 23 go.sh........................................................................................................................ 27
Figure 24: HTTPS Download App ......................................................................................... 27
Figure 25: TLS/SSL certificate ............................................................................................... 28
Figure 26: Network interference error .................................................................................... 28
Figure 27: HTTPS connection with samungrm.net ................................................................ 29
Figure 28: HTTP POST pin-code ........................................................................................... 30
Figure 29 AllShare settings ..................................................................................................... 31
5
1 Introduction
Smart TVs are considered as a mandatory entertainment system tailored to the average user
which can be placed to a typical home/office network. These systems have several
functionalities:
Content delivery like photos, movies and music from other computers or network
attached storage devices
Access to Internet-based services like video and audio streaming, as well as social apps.
This kind of entertainment system demands to have a proper operating system (stripped
down Linux based OS). It is equipped with a CPU (ARM based), RAM, Flash-storage and
EEPROM. Similarly with smartphones and tablets, most of the Smart TVs can be updated via
Internet or USB. As most of the latest Smartphone OSs demand an application repository, Smart
TVs are no exception in this rule. Every manufacturer has created its own app store where the
users can install, uninstall and update their apps according to their needs. Given that some of the
apps deal with private information, vendors are expected to create devices that are secure enough
in order to prevent unauthorized access to the TV and block active and passive attacks from
hackers.
This unauthorized access permits the TV acting in different modes:
As a Trojan horse to the home network.
As a stealth surveillance camera/mic service.
As a botnet.
Passive attacks permit eavesdropping of sensitive data.
Active attacks permit impersonation (MiTM attack).
7
Based on the fact that Smart TVs are rather popular in homes, offices, educational institutes
and public areas (cafes), our purpose is to investigate the level of security of a Smart TV and
assess the security risks. Specifically, our model of reference will be a Samsung TV, due to its
large market share (almost 25%)1
A Smart TV is considered unsecure due to the following reasons: Firstly, there is no shell
access provided to the user, which makes the identification of an attack almost impossible.
Secondly, there is no antivirus created for Smart TVs and - even if existed - it wouldnt make the
product more secure. In any case, it is proposed that vendors should provide secured devices
without any intervention from a third party. Hence, the following question and sub-questions
arise:
What kinds of security countermeasures are implemented in a Samsung Smart TV?
Are they enough in order to characterize the Smart TV secure?
Are there any vulnerabilities? If so, how can we misuse them?
Our approach is based on remote attacks and not on attacks requiring physical access to the
device. A remote attack is far more challenging as a method, since it can be applied both in a
single and in a multi-attack scenario.
The structure of this paper is as follows: At first, the Materials and Methods are stated,
followed by the Vulnerability Analysis where the major (Firmware Attack-Browser Attack) and
minor attacks (Miscellaneous Attack) are discussed. Furthermore, there is a short Discussion in
which all the design flaws and their consequences are presented. The Conclusion chapter
provides answers to the research question while the Future Work section gathers our ideas
concerning all further research work which needs to be done.
http://www.koreatimes.co.kr/www/news/biz/2012/10/309_114056.html
2.2 Methods
The following topology diagram was applied for our experiments:
Figure 1: Topology diagram
Samsung Smart TV
Eth:
IP:10.42.0.53/24
Gateway/DNS:10.42.0.1
Internet
Linksys WRT54G
as a switch
Samsung Computer
Eth0:
IP:10.42.0.1/24
Wireless: Internet
Burp Suite
Sony Laptop
Eth0:
IP:10.42.0.120/24
Gateway/DNS:10.42.0.1
Apache Server
10
3 Vulnerability Analysis
The aim of this research paper is to find new vulnerabilities or expand vulnerabilities that
have been already found. The scheme of black box approach was followed. Initially, based on
the technical characteristics of the TV, six areas which could possibly reveal vulnerabilities were
identified: Firmware, Browser, Samsung Apps, Remote Help Management, AllShare and
Remote Control. Moreover, additional tools like, Zenmap and Nessus, were used to further
complete our research. More emphasis was given to the first two research areas in which the
major weaknesses were revealed.
http://www.samsung.com/uk/support/model/UE32ES5500KXXU-downloads
11
Root access means full access to all features that the TV provides like file system, usb ports, Ethernet,
microphone, camera etc.
4
http://wiki.samygo.tv/index.php5/Extracting_the_ES-series_firmware
12
Using the SammyGoFirmwarePacher.py 5 the firmware was decrypted (Figure 3) and the
following files were derived.
Figure 3 USB decryption process
http://sourceforge.net/p/samygo/code/HEAD/tree/patcher/trunk/SamyGO%20Firmware%20Patcher.py
13
The uImage is the VDLinux based kernel image, while rootfs.img and appext.img are the
file system and auxiliary data/programs images respectively. The most important image is the
exe.img because it contains the exeDSP which is the main executable for running the digital
signal processor (DSP). The next step was to mount those images and inspect them thoroughly.
Exe.img contains rc.local which defines the booting order of the system as well as the different
types of libraries being used. The folder WIFI_LIB contains the drivers supported for Wifi
hardware as well as the iperf tool. Moreover, the Java folder has all the supported java libraries.
In the following figure (Figure 5) the whole exe.img file structure is depicted.
Figure 5 exe.img files
By mounting rootfs.img it was possible to view the whole filesystem structure (Figure 7).
Most of the folders are symbolic links that point the common read/write area (mtd_rwcommon)
which is the sandbox for the apps. By exploring /etc/ we can find rc.local which reveals all
the mountpoints.
Figure 6 /etc/rc.local
14
By investigating the /bin folder enabled us to understand what types of commands are
available. All these commands are linked(symbolic) to busybox.
Figure 8 /bin
15
Firmware files downloaded via the online procedure are not signed. So, by decrypting,
modifying and then re-encrypting the firmware someone can easily update the TVs firmware
with his own customized version. However, creating a customized version is very dangerous,
considering the possibility of getting your Samsung TV bricked. Brick is a term used by the
hacking community when a device is not operational due to a software update failure. Assuming
that the customized Firmware was developed correctly, you can update the TV through the
online update procedure.
3.1.4 Attack Procedure
Based on Wireshark, it was found that the online update procedure starts with a TLS/SSL
connection with www.samsungotn.net.
Figure 9: samsungotn.net certificate
The certificate is signed with Samsung Hubsite private key. Using Burp Suite, a Man in The
Middle attack (MiTM) was performed, yet the TV popped up a network error due to the denial of
Burp Suites self-signed certificate.
16
Looking up closely at the captured communication between the two entities (Samsung TV
Samsung Web Server), it was discovered that after this initial HTTPS connection with
www.samsungotn.net, a HTTP (unsecure) connection was established with the same webserver
for checking the availability of a new update (Figure5). Afterwards, another HTTP connection
was established with az43064.vo.msecnd.net to actually download the firmware files (Figure
6).
Figure 11: Unsecure firmware update check
17
Based in the above facts we added a static DNS entry to the hosts file in order to forward
the HTTP GET request to a local Web Server, running on the other laptop, instead of Samsung
update Web Server (az43064.vo.msecnd.net). Furthermore, by using the download link 6
provided by Wireshark captured file, the first file (appext.img) needed for the upgrade process
was downloaded. The only thing missing was to test whether the download procedure would
accept the file that was provided by our Apache Web Server. As expected the file was
successfully accepted. (Figure 7 8)
Figure 13: Local server update
http://az43064.vo.msecnd.net/firmware
18
5. The connection is established and protected with master key K until the session is
terminated.
Supported ciphers, Rc
Certificate, Chosen cipher, Rs
{S}server,E(h(msgs,CLNT,K),K)
h(msgs,SRVR,K)
Data proteccted with key K
Web Server
Smart TV
Client
Supported ciphers, Rc
{S1}server,E(h(msgs1,CLNT,K1),K1)
{S2}server,E(h(msgs2,CLNT,K2),K2)
h(msg,SRVR,K1)
h(msg,SRVR,K2)
Web server
The client establishes an SSL connection with the attacker, by using master key K1 after its
certificate is accepted by the client. In the meantime the attacker establishes a SSL connection to
20
the server that the client has intention to connect using a master key K2. Now, the attacker can
read or modify any conversation exchanged between the client and the server. This type of attack
can be prevented by automatically checking the validity of the certificate. If this is not the case
the user must be always asked whether the certificate should be trusted or not.
Figure 17: Certificate example
A SSL server certificate contains the public key of the server, the common name of the
server, the starting day of the validity and the expiration day, all signed by a Certificate
Authority. A common browser has pre-installed certificates of trusted Certificate Authorities in
order to check the validity of any given certificate. Furthermore, it verifies if the requested
domain matches the CN that the certificate is signed for and also checks whether the duration
that the certificate is valid for, matches the local time.
3.2.5 Attack Procedure (SSL MiTM)
In order to apply such a MiTM attack, a proxy server (Burp Suite) with a self-signed
certificate was used. As it is depicted, the Samsung Laptop plays the role of a router. Through
21
iptables configuration7 packets whose source IP is equal to the TVs IP and whose destination
port is equal to 443 are forwarded to port 8080, on eth0 that Burp Suite listens.
Figure 18: Burp Suite proxy
The idea behind this MiTM attack is to check whether Samsungs browser checks for trusted
SSL certificates when going to a secure HTTPS website. So, a site that supports HTTPS
connection and its certificate is signed by a trusted authority (VeriSign) was typed in:
https://www.facebook.com/. The TVs browser, establishes an HTTPS connection with Burp
Suite by accepting (without user verification) the Burp Suites self-signed certificate. Then, the
specific HTTPS GET request is being forwarded by Burp Suite to Facebook.
sudo iptables -A PREROUTING -t nat -i eth0 -p tcp --dport 443 -s 10.42.0.53 -j REDIRECT --to-port 8080
22
The response also passes through Burp Suite and the login page appears in Samsungs
browser.
Figure 20: Facebook login page
Furthermore, a small lock badge shows up in the toolbar, indicating a false notification that a
secure connection is established with the specific site. Next, the demo credentials are typed in,
and Burp Suite intercepts all the traffic that is being sent.
23
It is possible to modify the request/response, sent/received through Burp Suite and enhance
the attack. As depicted from the above figure, both the user name and password appear, verifying
a successful MiMT.
24
http://www.samsungdforum.com/Devtools/Spec
http://www.samsungdforum.com/Devtools/SdkReleaseNote
10
http://www.samsungdforum.com/Guide/ref00001/index.html
11
http://forum.samygo.tv/download/file.php?id=1509
25
The app essentially copies from the usb stick a modified library libm.so.6 to the filesystem
of the TV by using the following method eval("FilePlugin.Copy(\"/dtv/usb/sda1/libm.so.6\",
\"/dtv/libm.so.6\")");. This command proves that the sandbox of the mtd_rwcommon area is
broken given that it can actually write on the restricted /dtv folder. When you open the
browser, the script /dtv/usb/sda1/bin/run.sh (Figure 23) runs and provides shell and ftp access.
This is done by installing a busybox (richer than the one installed on the TV) on the /tmp/bin
folder. Finally by adding the following lines to the script it is possible to write the results of
commands netstat, ps, dmesg to log files on the usb stick. The results are provided to the Appendix.
Also by adding " kill all 68 ( 68 process is exeDSP) the TV freezes and reboots.
mkdir /tmp/os3
chmod 777 /tmp/os3
netstat -tulpn > /tmp/os3/netstat.log
ls -alt / > /tmp/os3/ls_root.log
ls -alt /bin >> /tmp/os3/bin.log
ps >> /tmp/os3/ps.log
dmesg > /dtv/usb/sda1/from_tv/dmesg.log
cp -r /tmp/os3/* /dtv/usb/sda1/from_tv/
26
Figure 23 go.sh
However, this cannot be considered as a remote attack because the attacker has to have
physical access in order to use the usb ports of the TV and login as a developer. There is only
one (legit) way to install an app to a Samsung Smart TV is by downloading it from the Samsung
store. In this case, Samsung needs to approve that your app is secure before it can be publicly
available. It was impossible to determine how Samsung does this evaluation and in what depth
the application is checked for security flaws. The last thing that needs to be checked is how the
install/update procedure from Samsung apps is performed.
Figure 24: HTTPS Download App
27
From the below picture it can be derived that use of Samsung apps demand an HTTPS
connection.
Figure 25: TLS/SSL certificate
The certificate is signed with DigiCerts private key. Using Burp Suite, a Man in The Middle
attack (MiTM) was attempted, yet the TV popped up a Network interference error due to the
denial of Burp Suites self-signed certificate.
Figure 26: Network interference error
So a hacker cannot impersonate Samsung apps Web service unless he possesses the private
key.
28
Once again, the Web Servers certificate was signed by Samsung Hubsite CA and we
verified that the TV checks the validity of the certificate that is provided.
Our hypothesis is that this secure connection, which is a reverse connection, works in the
same way as various remote control services that have to bypass any firewall. We suspect that
the pin-code is an identifier for the Samsung engineer to distinguish the customers request for
help.
29
This pin though is sent in clear text, but this would not imply that this is a bad
implementation in terms of security. Unfortunately, it cannot be stated that is secure either. It
was impossible to communicate with Samsungs remote assistant service in order to establish a
session; due to its high demand and lack of availability. Hence, capturing the network traffic data
was infeasible. This remote service might hide a vulnerability that must be researched in depth.
3.3.3 AllShare
AllShare is a service that is used to share contents within a Local Area Network (LAN) with
DLNA compliant devices. DLNA stands for Digital Living Network Alliance and uses UPnP for
media management discovery and control.
For this service, the TV uses the 55000 and 55001 ports and the traffic is unencrypted since
the DLNA protocol does not support encryption12. This cannot be considered as a security issue
but a design feature. It should be mentioned that a typical authentication (hostname, ip-address)
is being used, so when a media server wants to connect to the TV for the first time a pop up
dialog box appears on the TV screen to accept or reject access.
12
http://www.dlna.org/
30
31
scanners) were used to stress test the lighttpd daemon. Nikto and DirBuster did not give any
valuable results yet the following ssl-dos attack did.
thc-ssl-dos -n 800 10.42.0.53 443
.
Handshakes 48 [47.98 h/s], 462 Conn, 0 Err
.
Handshakes 219 [40.89 h/s], 474 Conn, 0 Err
Handshakes 297 [78.16 h/s], 474 Conn, 0 Err
.
Handshakes 16500 [77.36 h/s], 536 Conn, 0 Err
Handshakes 16569 [69.50 h/s], 536 Conn, 2 Err
Handshakes 16648 [78.95 h/s], 536 Conn, 2 Err
Handshakes 16719 [70.30 h/s], 536 Conn, 2 Err
Handshakes 16796 [77.66 h/s], 536 Conn, 2 Err
Handshakes 16867 [71.25 h/s], 535 Conn, 4 Err
.
Handshakes 19294 [76.06 h/s], 542 Conn, 12 Err
Handshakes 19372 [75.22 h/s], 543 Conn, 12 Err
Handshakes 19452 [82.50 h/s], 543 Conn, 12 Err
.
Connection timed out
Connection timed out
Connection timed out
In the above script we set an upper limit of parallel connections equal to 800. The script starts
with the minimum of ~460 parallel connections and increments up to 800, while keeping an
average rate of 65 handshakes per second for the whole session. As it is depicted, after the
16500th connection lighttpd starts returning errors (2 Err). At some point (after 60s) the server
cannot handle any of the incoming connections; hence returning connection time out. At this
point the server becomes non-operational.
When the decrypted firmware was available, it was possible to read the configuration file of
the Web Server.
#
# Security hardening
#
# Give another name to the server, we dont want hackers to know which server we use
server.tag="Swift1.0"
# Prevent access to all files except the virtual folders which are supported
$HTTP["url"] !~ "^/($|www/|ws($|/)|api($|/)|test($|/)|dtv/usb($|/)|dev($|/))" {
url.access-deny = ("")
}
32
With the above regular expression the Web Server prevent us from having access to anything
except folders /,/ws, /api, /test, /dtv/usb and /dev. A tcpdump session was scheduled
to run for eight hours, yet we did not observe any local traffic.
3.3.6 Other Network related daemons
There are other 4 tcp ports open (7676, 6000, 3697 and 9090) besides the ports used for
lighttpd and DLNA (80, 443, 4443, 55000 and 55001). Likewise, a tcpdump session was
scheduled to run for eight hours, yet no connection was established in these ports. We did not
observe any local traffic in this case either.
33
and sends
sensitive data in
clear
text
(email=donpsol%40gmail.com
&
34
4 Discussion
During the assessment of Samsung TV, we identified the following design flaws.
36
5 Conclusion
There were several countermeasures that were implemented by Samsung for many of the
services provided, in order to offer a secure environment for the users. Yet in some cases, these
were proven to be insufficient. In particular, the firmware by itself is encrypted by AES+XoR,
but the keys have already been found, making the firmware modification possible. In addition,
based on the attack method described, an upgrade with a modified firmware can be done
remotely.
Moreover, this Smart TV system supports SSL/TLS protocol which, in most cases, is
successfully implemented with one exception, the browser. The browser accepts any SSL
certificate that makes it susceptible to a Man in The Middle Attack without the users notice.
Regarding the Samsung Apps repository, the downloading procedure is performed through a
secure connection with Samsungs servers that provide only apps which are already approved by
Samsung. It wasnt possible to determine the level of security check that is being applied to apps,
given that there was no time creating a malicious one and waiting to be approved or rejected. The
security policy applied by Samsung was to create a Sandbox with which a app can only
write/read from a specific folder and not outside of it. This policy however, was proven to be
violated by using a Javascript method which copies files from a source to a destination outside
the sandbox.
Finally, some popular and preinstalled apps were checked in terms of the communication
protocol being used and all of them were found secure except Path.
37
6 Future Work
There are quite a lot of areas that can be investigated and considered as a future work,
considering we are talking about a new commercial product equipped with various network
services.
Create a Custom Firmware
Create a custom Firmware that provides remote shell access to the TV and distribute it
through our Attack Procedure.
Check Remote Help Service
It is intriguing to actually eavesdrop the communication between the TV and the Samsung
support center during this Remote Help Service, since it could reveal a serious vulnerability.
Root ES models in a remote way.
The possibility of rooting the TV remotely and enabling shell access would mean taking the
full control of the TV in a stealthy way.
Check Broadcast update.
It is very interesting that Samsung has enabled this feature and moreover it would be no
surprise if there is weak or no security at all for this procedure. With the current available tools,
someone can create a legitimate look-alike firmware, where a hacker can create a multi-attack
scheme through broadcasting.
Further investigation about daemons
There were 4 different ports open whose existence and functionality were unclear. Ports
9090, 3697, 7676, 6000.
Samsung TV apps security check assessment.
Develop a Trojan horse and check whether Samsung accepts it for the Samsung TV App
store.
38
39
Appendix
Nessus
Figure 31: Nessus Summary
40
Zenmap
Starting Nmap 6.00 ( http://nmap.org ) at 2013-01-08 11:27 CET
NSE: Loaded 93 scripts for scanning.
NSE: Script Pre-scanning.
Initiating ARP Ping Scan at 11:27
Scanning 10.42.0.53 [1 port]
Completed ARP Ping Scan at 11:27, 0.04s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 11:27
Completed Parallel DNS resolution of 1 host. at 11:27, 0.09s elapsed
Initiating SYN Stealth Scan at 11:27
Scanning 10.42.0.53 [65535 ports]
Discovered open port 443/tcp on 10.42.0.53
Discovered open port 80/tcp on 10.42.0.53
Discovered open port 7676/tcp on 10.42.0.53
Discovered open port 4443/tcp on 10.42.0.53
Discovered open port 55000/tcp on 10.42.0.53
Discovered open port 55001/tcp on 10.42.0.53
Discovered open port 6000/tcp on 10.42.0.53
Discovered open port 3697/tcp on 10.42.0.53
Discovered open port 9090/tcp on 10.42.0.53
Completed SYN Stealth Scan at 11:27, 4.63s elapsed (65535 total ports)
Initiating Service scan at 11:27
Scanning 9 services on 10.42.0.53
Completed Service scan at 11:29, 126.12s elapsed (9 services on 1 host)
Initiating OS detection (try #1) against 10.42.0.53
NSE: Script scanning 10.42.0.53.
Initiating NSE at 11:29
Completed NSE at 11:30, 30.02s elapsed
Nmap scan report for 10.42.0.53
Host is up (0.0015s latency).
Not shown: 65526 closed ports
PORT STATE SERVICE VERSION
80/tcp open http lighttpd
|_http-methods: OPTIONS GET HEAD POST
|_http-title: 404 - Not Found
443/tcp open ssl/http lighttpd
|_http-title: 404 - Not Found
|_http-methods: OPTIONS GET HEAD POST
| ssl-cert: Subject: commonName=106.1.9.39/organizationName=Samsung SERI/stateOrProvinceName=|
Issuer: commonName=Root CA/organizationName=Samsung SERI/stateOrProvinceName=Surrey/|
Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 1970-01-01 00:00:00
| Not valid after: 2030-01-01 00:00:00
| MD5: 3cc6 e4b0 203c fa68 5adf 3808 a651 9549
|_SHA-1: a387 008c bf7a 3745 fc7e 9ada 9200 df31 7bcb 65b7
3697/tcp open nw-license?
4443/tcp open ssl/pharos?
6000/tcp open X11 (access denied)
7676/tcp open imqbrokerd?
9090/tcp open zeus-admin?
55000/tcp open unknown
55001/tcp open tcpwrapped
41
2 services unrecognized despite returning data. If you know the service/version, please
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port7676-TCP:V=6.00%I=7%D=1/8%Time=50EBF49C%P=x86_64-unknown-linux-gnu%
SF:r(GetRequest,52,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x2
SF:0\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(HTTPOptio
SF:ns,52,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20\r\nConte
SF:nt-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(RTSPRequest,52,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20\r\nContent-Length:
SF:\x200\r\nConnection:\x20close\r\n\r\n")%r(FourOhFourRequest,52,"HTTP/1\
SF:.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20\r\nContent-Length:\x20
SF:0\r\nConnection:\x20close\r\n\r\n")%r(SIPOptions,52,"HTTP/1\.1\x20400\x
SF:20Bad\x20Request\r\nContent-Type:\x20\r\nContent-Length:\x200\r\nConnec
SF:tion:\x20close\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port9090-TCP:V=6.00%I=7%D=1/8%Time=50EBF497%P=x86_64-unknown-linux-gnu%
SF:r(GetRequest,54,"HTTP/1\.0\x20200\x20OK\r\nContent-type:\x20application
SF:/octet-stream\r\nCache-Control:\x20no-cache\r\n\r\n")%r(HTTPOptions,54,
SF:"HTTP/1\.0\x20200\x20OK\r\nContent-type:\x20application/octet-stream\r\
SF:nCache-Control:\x20no-cache\r\n\r\n")%r(FourOhFourRequest,54,"HTTP/1\.0
SF:\x20200\x20OK\r\nContent-type:\x20application/octet-stream\r\nCache-Con
SF:trol:\x20no-cache\r\n\r\n");
MAC Address: 1C:5A:3E:E3:F1:4B (Unknown)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:kernel:2.6
OS details: Linux 2.6.17 - 2.6.36, Linux 2.6.19 - 2.6.35
Uptime guess: 0.006 days (since Tue Jan 8 11:21:05 2013)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=197 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Unix
TRACEROUTE
HOP RTT ADDRESS
1 1.50 ms 10.42.0.53
NSE: Script Post-scanning.
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.Nmap done: 1 IP
address (1 host up) scanned in 162.94 seconds
Raw packets sent: 65555 (2.885MB) | Rcvd: 65551 (2.623MB)
42
ls_bin.log
drwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
lrwxrwxrwx
-rwxrwxrwx
drwxrwxrwx
-rwxrwxrwx
26 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
1 root
2 root
1 root
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
43
ls_root.log
drwxr-xr-x 39 root 0
drwxr-xr-x 10 root 0
drwxr-xr-x 14 root 0
drwxrwxrwx 26 root 0
drwxrwxrwx 26 root 0
-rwxrwxrwx 1 1009 1009
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
lrwxrwxrwx 1 root 0
drwxrwxrwx 3 root 0
drwxrwxrwx 3 root 0
drwxrwxrwx 2 root 0
drwxrwxrwx 3 root 0
drwxrwxrwx 12 root 0
drwxrwxrwx 2 root 0
drwxrwxrwx 2 root 0
drwxrwxrwx 5 root 0
drwxr-xr-x 1 root 0
drwxr-xr-x 1 root 0
drwxr-xr-x 1 root 0
drwxr-xr-x 1 root 0
drwxrwxrwt 3 root 0
drwxrwxrwt 5 root 0
drwxr-xr-x 1 root 0
drwxr-xr-x 1 root 0
drwxr-xr-x 1 root 0
drwxrwxrwt 2 root 0
drwxrwxrwt 2 root 0
dr-xr-xr-x 57 root 0
drwxr-xr-x 11 root 0
44
netstat.log
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address
Foreign Address
State
PID/Program name
tcp
0
0 127.0.0.1:58912
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:50242
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 0.0.0.0:9090
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:54211
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:46340
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:45253
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:48869
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:41351
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:47111
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:58600
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:34761
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:57417
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:40521
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:42122
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:53068
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:55692
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:42445
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:45069
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:53485
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:49389
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:44430
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:51982
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:36111
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:54735
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:52112
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 0.0.0.0:80
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:50000
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 0.0.0.0:6000
0.0.0.0:*
LISTEN
236/X
tcp
0
0 127.0.0.1:45425
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:41969
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 0.0.0.0:3697
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:45138
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:53938
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:37523
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:49811
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:36979
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:37715
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:41364
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:33012
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:58868
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:46484
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 0.0.0.0:21
0.0.0.0:*
LISTEN
1091/busybox
tcp
0
0 127.0.0.1:38197
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 0.0.0.0:23
0.0.0.0:*
LISTEN
1092/remshd
tcp
0
0 0.0.0.0:55000
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 0.0.0.0:55001
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:36730
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:53115
0.0.0.0:*
LISTEN
68/exeDSP
tcp
0
0 127.0.0.1:38555
0.0.0.0:*
LISTEN
261/WidgetEngine
tcp
0
0 127.0.0.1:57947
0.0.0.0:*
LISTEN
261/WidgetEngine
45
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
udp
udp
udp
udp
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0 0.0.0.0:4443
0.0.0.0:*
0 0.0.0.0:443
0.0.0.0:*
0 127.0.0.1:38268
0.0.0.0:*
0 10.42.0.53:7676
0.0.0.0:*
0 127.0.0.1:58430
0.0.0.0:*
0 127.0.0.1:49566
0.0.0.0:*
0 127.0.0.1:45822
0.0.0.0:*
0 127.0.0.1:54623
0.0.0.0:*
0 127.0.0.1:40959
0.0.0.0:*
0 127.0.0.1:49087
0.0.0.0:*
0 0.0.0.0:1900
0.0.0.0:*
0 10.42.0.53:24234
0.0.0.0:*
0 127.0.0.1:2002
0.0.0.0:*
0 0.0.0.0:7900
0.0.0.0:*
LISTEN
68/exeDSP
LISTEN
68/exeDSP
LISTEN
261/WidgetEngine
LISTEN
68/exeDSP
LISTEN
68/exeDSP
LISTEN
68/exeDSP
LISTEN
261/WidgetEngine
LISTEN
68/exeDSP
LISTEN
261/WidgetEngine
LISTEN
261/WidgetEngine
68/exeDSP
68/exeDSP
68/exeDSP
68/exeDSP
46
ps.log
PID USER
VSZ STAT COMMAND
1 root
1688 S init
2 root
0 SW [kthreadd]
3 root
0 SW [ksoftirqd/0]
4 root
0 SW [migration/0]
5 root
0 SW [migration/1]
6 root
0 SW [ksoftirqd/1]
7 root
0 SW [events/0]
8 root
0 SW [events/1]
9 root
0 SW [khelper]
10 root
0 SW [async/mgr]
11 root
0 SW [sync_supers]
12 root
0 SW [bdi-default]
13 root
0 SW [kblockd/0]
14 root
0 SW [kblockd/1]
15 root
0 SW [kmmcd]
16 root
0 SW [kdtvlogd]
17 root
0 SW [kswapd0]
18 root
0 SW [xfs_mru_cache]
19 root
0 SW [xfslogd/0]
20 root
0 SW [xfslogd/1]
21 root
0 SW [xfsdatad/0]
22 root
0 SW [xfsdatad/1]
23 root
0 SW [xfsconvertd/0]
24 root
0 SW [xfsconvertd/1]
25 root
0 SW [mmcqd]
36 root
1692 S -/bin/sh
56 root
1692 S /bin/sh /mtd_exe/rc.local
67 root 1192m S ./exeDSP
146 root
0 SW [flush-179:0]
236 root
393m S /mtd_cmmlib/Runtime/bin/X -logfile /mtd_rwarea/Xlog.
417 root
628m R /mtd_appdata/InfoLink/lib/WidgetEngine 67 51982
517 root
0 SW [khubd]
599 root
1688 S udhcpc -i eth0 -T 2 -b
602 root
0 SW [scsi_eh_0]
603 root
0 SW [usb-storage]
609 root
0 DW [scsi-poller]
679 root
0 SW [usbhid_resumer]
708 root
0 SW [flush-8:0]
877 root
3272 S N /mtd_exe/Comp_LIB/UEP.b
1061 root 78856 S /mtd_down/emps/empWebBrowserDRI/bin/BrowserLauncher
1064 root
1688 S sh -c /bin/sh /dtv/usb/sda1/run.sh
1065 root
1688 S /bin/sh /dtv/usb/sda1/run.sh
1068 root
1688 S /bin/sh -x /dtv/usb/sda1/bin/go.sh
1075 root
4148 R ps
47
dmesg.log
ts in Zone order, mobility grouping on. Total pages: 126212
Kernel command line: console=tty1,115200 root=/dev/mmcblk0p3 rootfstype=squashfs
LX_MEM=0x40200000,0x14900000 LX_MEM2=0xA4E00000,0xB200000
EMAC_MEM=0x40000000,0x100000 SELP_ENABLE=1198282 Onboot : 1003 quiet
PID hash table entries: 2048 (order: 1, 8192 bytes)
Dentry cache hash table entries: 65536 (order: 6, 262144 bytes)
Inode-cache hash table entries: 32768 (order: 5, 131072 bytes)
Memory: 329MB 178MB = 507MB total
Memory: 508960k/508960k available, 10208k reserved, 0K highmem
Virtual kernel memory layout:
vector : 0xffff0000 - 0xffff1000 ( 4 kB)
fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
DMA : 0xffc00000 - 0xffe00000 ( 2 MB)
vmalloc : 0xe0000000 - 0xf8000000 ( 384 MB)
lowmem : 0xc0000000 - 0xdfb00000 ( 507 MB)
modules : 0xbf000000 - 0xc0000000 ( 16 MB)
.init : 0xc0008000 - 0xc0025000 ( 116 kB)
.text : 0xc0025000 - 0xc02f7000 (2888 kB)
.data : 0xc02f8000 - 0xc031b460 ( 142 kB)
SLUB: Genslabs=11, HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Hierarchical RCU implementation.
RCU-based detection of stalled CPUs is disabled.
Verbose stalled-CPUs detection is disabled.
NR_IRQS:256
Global Timer Frequency = 450 MHz
CPU Clock Frequency = 900 MHz
Console: colour dummy device 80x30
console [tty1] enabled
[VDLP] preset_lpj manual set to 3588096
Calibrating delay loop (skipped) preset value.. 1794.04 BogoMIPS (lpj=3588096)
pid_max: default: 32768 minimum: 301
Mount-cache hash table entries: 512
CPU: Testing write buffer coherency: ok
Calibrating local timer... 450.50MHz.
CPU1: Booted secondary processor
[VDLP] preset_lpj manual set to 3588096
Brought up 2 CPUs
SMP: Total of 2 processors activated (3588.09 BogoMIPS).
NET: Registered protocol family 16
#_# Mstar_ehc_platform_init 0xFD200DE0 => 4e00
L310 cache controller enabled
l2x0: 8 ways, CACHE_ID 0x410000c8, AUX_CTRL 0x32460000, Cache Size: 524288 B
bio: create slab <bio-0> at 0
vgaarb: loaded
SCSI subsystem initialized
Switching to clocksource timer1
NET: Registered protocol family 2
IP route cache hash table entries: 4096 (order: 2, 16384 bytes)
TCP established hash table entries: 16384 (order: 5, 131072 bytes)
TCP bind hash table entries: 16384 (order: 5, 196608 bytes)
TCP: Hash tables configured (established 16384 bind 16384)
TCP reno registered
48
49
samsung_mstar mod ld
## X10P FASTLOGO ver : 0014 ##
# FastLogo On
SD_MISC_LVDS_FMT_VESA_8
FastLogo mod ld
Exit Show Logo Successfully
FastLogo mod uld
ioctl: GET_PNL_INIT_STATUS
************* UART1 Request IRQ *************
===================================
FCR c1
===================================
UART DLL or UART_IER is being modified by value:0xbf
UART DLL or UART_IER is being modified by value:0x2
===================================
FCR c1
===================================
===================================
FCR c1
===================================
Adding 102396k swap on /dev/ramzswap0. Priority:-1 extents:1 across:102396k SS
[CIP_KERNEL] /bin/authuld can read (after=0)
[CIP_KERNEL] >>> (/bin/authuld) file is successfully authenticated <<<
[CIP_KERNEL] (0)th waiting.
[ PHY Addr ] ==> :0
alloRAM_PA_BASE= 0x40000000 alloRAM_SIZE= 0x100000
50
51
52
53
54