Blog Archives

Chromecast update breaks root-friendly exploit

We hope you weren’t planning to tinker with your Chromecast this weekend. GTVHacker has confirmed that a recent firmware update to Google’s streaming media stick plugs the bootloader exploit that many are using to get root access.

via Pocket http://www.engadget.com/2013/08/02/chromecast-update-breaks-root-friendly-exploit/

Posted in google, technology Tagged with: , , ,

Chromecast Has Been Rooted – Bootloader Exploit

Well that didn’t take long. The team over at GTVHacker have worked their magic on Chromecast. The HDMI dongle announced by Google last week was so popular they had to cancel their 3-free-months of Netflix perk.

via Pocket http://hackaday.com/2013/07/29/chromecast-bootloader-exploit-it-runs-android/

Here’s the how-to: Bootloader Exploit Package
Waiting on my USB OTG cable to come….

Posted in do it yourself, google, technology Tagged with: , , , , , ,

Chromecast Hacking Has Begun

chromecast
Initial chromecast testing has revealed that it is a DIAL device and sniffing shows several interesting commands that can be sent to it.

The chromecast dongle is apparently listening on http port 8008. (Also port 9080 while Netflix app is running)

Some control can be established by sending simple HTTP GET’s, POST’s and DELETE’s.

** For these examples the youtube app is running, also available are Netflix, ChromeCast, and GoogleMusic.

get device information xml:
curl http://10.0.1.2:8008/ssdp/device-desc.xml

get detailed device information json:
curl http://10.0.1.2:8008/setup/eureka_info?options=detail

scan for available wifi:
curl http://10.0.1.2:8008/setup/scan_results

get supported time zones:
curl http://10.0.1.2:8008/setup/supported_timezones

get info about current app:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/apps/YouTube -X GET

send youtube video to chromecast:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/apps/YouTube -X POST -d ‘v=oHg5SJYRHA0’

kill current running app:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/apps/YouTube -X DELETE

reboot the chromecast dongle:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/setup/reboot -d ‘{“params”:”now”}’ -X POST

factory default reset the chromecast dongle:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/setup/reboot -d ‘{“params”:”fdr”}’ -X POST

Hopefully more to come… Focusing on the websocket connections now

I would like to be able to send commands (power, volume, source) to the tv through the hdmi-cec connection of the chromecast.

Posted in do it yourself, google, technology Tagged with: , , , , , , , ,
  • admin-photo
  •  
  • brandon fiquett
  • tech enthusiast, developer, engineer, scuba instructor, drone pilot, K2FIQ.

subscribe via email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 4 other subscribers