MasterWard Profile
  • Introduction
  • Media Links
  • Resume
  • HackThebox Notes
    • RedPanda
    • Metatwo
  • CTF Contest Writeups
    • 2017
      • Takoma Park CTF
      • TUCTF 2017
      • HITCON CTF 2017 Quals
      • CSAW CTF Qualification Round 2017
      • SEC-T CTF
      • Backdoor CTF 2017
      • Hack Dat Kiwi 2017
      • Kaspersky 2017
      • Hack.lu 2017
      • HackCon 2017
      • Defcamp 2017
      • Square CTF 2017
      • Mitre 2017
      • EKOPARTY CTF 2017
    • 2018
      • SEC-T CTF
      • Hackcon 2018
      • EasyCTF IV 2018
      • DefCamp CTF Qualifiers
      • PACTF 2018
      • CSAW CTF Qualifiers 2018
      • PicoCTF 2018
    • 2019
      • Newark Academy CTF 2019
      • Crypto CTF 2019
      • PicoCTF 2019
        • General Skills
        • Binary Exploitations
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • TAMUctf 19
    • 2021
      • picoCTF 2021
        • General Skills
        • Binary Exploitation
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • HackiHoli
      • S.H.E.L.L CTF
      • DawgCTF 2021
      • TCTF 2021
      • RedPwnCTF 2021
      • IJCTF 2021
      • UIUCTF 2021
      • Really Awesome CTF 2021
      • TMUCTF 2021
      • CSAW Qualifiers 2021
      • Pbjar CTF 2021
      • Deadface CTF 2021
    • 2022
      • NahamCon CTF 2022
      • BYUCTF 2022
      • DEF CON Qualifiers 2022
    • Useful Code
  • Software
    • Video Standardization and Compression
    • TOBIAS
    • Tracking Phone
    • Image Compression
    • Do Not Call Database
    • Color Blind Simulator
    • Gmail Unsubscriber
    • MP4 to GIF Converter
    • Optical Character Reading
    • Soft Jobs
    • OBD Project
    • Online Movie Finder
    • Work In Progress
      • Incremental Backup
      • Web Scraper - Wallpaper Edition
      • Web Blocker
      • File Manipulator
      • AppFiller
      • Cyber Security Projects
      • Bsaber AI
    • Ideas
      • CAN Programming
      • Malicious Programs
      • Remove Yourself from the Internet
      • DNA Classic
      • Auto Clicker
      • Adding Depth to a Video
      • Collage Mosaic Generator
      • Game Destroyer
      • Hearing aid Technology
      • Sign Language Recognition
      • Text Summarizer
      • Video to audio to text
      • Video Object Detection
      • VR demonstration
      • More Ideas to Elaborate on
    • Failure
      • Police Camera Radar
      • Already Created
      • Google Maps Game
      • Car price prediction
      • Bullshit Detector
      • Automated Code writter
      • Career Prediction
      • Samsung Remote Control Hack
      • Invalid Finder
      • PiHole Regex Filter
      • Group Archiver
  • Additional Articles
    • Cleaning Up a Computer Tricks
    • Getting started in Cyber Security
    • Speeding Up Your Internet
    • College Experience
    • Currently Writting
      • Reverse Engineering Notes
      • Bug Bounty Guide and Examples
      • OSCP help
      • Job Experience
      • Professional Job-Hunting Experience
Powered by GitBook
On this page
  • Origin
  • Overview
  • Step 1 - Recon
  • Failure

Was this helpful?

  1. Software
  2. Failure

Samsung Remote Control Hack

Origin

So, I lost the remote and found an app that could do it, but it had a lot of ads and required pairing. I thought ok so that is possible but if the neighbor had a tv and I connected to it. Fast forward to a little while later when my GF complains that the Wi-Fi is slow.

Overview

The application would with the ip address of the tv be able to send signals without it even on or connected because it is forcing packets to the protocol.

Step 1 - Recon

I did Wireshark on the Wi-Fi and found that the TV was using UPNP protocol and through a Nmap scan it showed indeed that protocol was open | filtered which theoretically means it was possible. I found someone with code for before this version and shows that it is possible though it does use AES encryption which will have to be cracked.

All other programs I found was for versions 2018 or earlier devices meaning there was a patch so this was a concern at one point.

Failure

Once I was done with researching I had to determine one aspect of every project. Is the reward worth the amount of time I am going to spend. I have a low threshold as I will do things for stupid reasons but this one was different. The requirement for code and reverse engineering is possible and would say a medium skilled person like me could pull it off. The problem is the cryptography aspect being the key strength of the project. That is not a strong point at all so I would need someone else and not many people are reliable.

Theoretical steps of how it would work

I would be creating a virtual device through the OS Tizen and SDK (available so developers can make applications). Then to the actual application to set up an application that with the prior authentication can send signals to the OS for actions. Once we got our signals down we then have to get to the hard part of going backwards step by step. First step is the encryption, by sending malformed packets you can find the pattern used for a successful crack of the authentication process. One more step up is authentication and trying to get the device to interpret a packet without authentication process being used. That is how I would go about it but I am no expert so there might be a step that is not needed or an easier way.

PreviousCareer PredictionNextInvalid Finder

Last updated 2 years ago

Was this helpful?