Trouble Using Bootloader Exploit

This section is for posts related to the Google Chromecast
Post Reply
PopeXXIII
Android 1.0
Posts: 6
Joined: Fri Dec 07, 2012 10:21 am
GTV Device Owned: NSZ-GT1 (Bluray Player)

Trouble Using Bootloader Exploit

Post by PopeXXIII » Tue Jul 30, 2013 9:30 pm

Hello to whoever might be listening. I'll try to detail my situation and maybe someone will have insight into why this isn't working.

I have the following:

USB power adapter from the Chromecast box
Prefab OTG cable
Homebrew OTG cable
USB stick imaged on OSX
USB stick imaged on Windows 7

Soldered a couple male USB connectors and a female USB connector to rig these items together in various configurations.

While holding down the Chromecast button, the best I get is a couple blinks out of the USB sticks. It seems like something is happening, but it doesn't kick off the entire imaging process.

Both OTG cables work to connect a mouse to my Nexus 7.

Any ideas?

coggy9
Android 1.0
Posts: 16
Joined: Mon Aug 01, 2011 7:30 pm
GTV Device Owned: Logitech Revue

Re: Trouble Using Bootloader Exploit

Post by coggy9 » Wed Jul 31, 2013 10:52 am

What is your firmware version? Google might have pushed an update. You can check in the Windows/OSX app. http://i.imgur.com/xBo7aC6.png

PopeXXIII
Android 1.0
Posts: 6
Joined: Fri Dec 07, 2012 10:21 am
GTV Device Owned: NSZ-GT1 (Bluray Player)

Re: Trouble Using Bootloader Exploit

Post by PopeXXIII » Wed Jul 31, 2013 12:21 pm

Same. 12072.

garhomes
Android 1.0
Posts: 2
Joined: Wed Jul 31, 2013 1:21 pm
GTV Device Owned: NSX-40GT1 (Internet TV)

Re: Trouble Using Bootloader Exploit

Post by garhomes » Wed Jul 31, 2013 1:25 pm

I have the same issue, maybe a blink or two on the stick followed by a few colored dots on the right side of the screen. You can actually see the screen I am talking about in the video posted in the gtvhacker blog: http://www.youtube.com/watch?feature=pl ... W38nEleiBM I have tried different power supplies/usb sticks to no avail. Purchased my OTG cable from atomicmarket a few years ago, I assume that's where the issues lie.

PopeXXIII
Android 1.0
Posts: 6
Joined: Fri Dec 07, 2012 10:21 am
GTV Device Owned: NSZ-GT1 (Bluray Player)

Re: Trouble Using Bootloader Exploit

Post by PopeXXIII » Wed Jul 31, 2013 7:53 pm

I assumed it was my OTG cable too. That's why I busted out my soldering iron and made a fresh one myself. Same result. A couple blinks and colored dots on the screen.

garhomes
Android 1.0
Posts: 2
Joined: Wed Jul 31, 2013 1:21 pm
GTV Device Owned: NSX-40GT1 (Internet TV)

Re: Trouble Using Bootloader Exploit

Post by garhomes » Thu Aug 01, 2013 12:14 pm

garhomes wrote:I have the same issue, maybe a blink or two on the stick followed by a few colored dots on the right side of the screen. You can actually see the screen I am talking about in the video posted in the gtvhacker blog: http://www.youtube.com/watch?feature=pl ... W38nEleiBM I have tried different power supplies/usb sticks to no avail. Purchased my OTG cable from atomicmarket a few years ago, I assume that's where the issues lie.
EDIT: FIXED! Ran through the same dd.exe process in Ubuntu, worked perfectly when I tried it. I originally used Win7, so maybe there is some problem during the writing process. Now you know! Use Linux.

PopeXXIII
Android 1.0
Posts: 6
Joined: Fri Dec 07, 2012 10:21 am
GTV Device Owned: NSZ-GT1 (Bluray Player)

Re: Trouble Using Bootloader Exploit

Post by PopeXXIII » Thu Aug 01, 2013 8:44 pm

$#@! Spent the last couple hours getting Linux running to make sure the image is written to the USB drive 100% properly. Now my Chromecast goes to the Updating splash screen, even if I'm holding down the recovery button. I'm not letting it run the update in hopes I can still get root access. It will be collecting dust until there is a solution. Grumble.

PopeXXIII
Android 1.0
Posts: 6
Joined: Fri Dec 07, 2012 10:21 am
GTV Device Owned: NSZ-GT1 (Bluray Player)

Re: Trouble Using Bootloader Exploit

Post by PopeXXIII » Fri Aug 02, 2013 6:35 pm

So, I am ripping my Chromecast apart.

What's the easiest way to attach leads to the UART pins?
Might there be some information gained from an update process log that might lead to another exploit vector?
Any brute force way to short out the device and get the update to fail? I'm willing to risk frying the device.

Post Reply

Who is online

Users browsing this forum: No registered users and 1 guest

 

 

cron

Login  •  Register