Hacking a Smart TV! - Android Debug Bridge Exploit
Android Debug Bridge Exploit (Port : 5555)
_______________________________
Note: This demo is only for educational purposes and has no malicious intent. It was not compromised or turned into a zombie. We only did file traversal and basic firmware walking.
_______________________________
POC for Remote Intrusion
To perform the following proof, we would require:
- Offensive Security and Penetration Testing Distribution Linux – Kali
- A network security auditing tool - Nmap
- Android Debug Bridge exploiter to remotely access the devices – Ghost Framework
- IP scanner and IoT search engine - Shodan
Procedure to install ghost on Kali
Commands:
git clone https://github.com/entynetproject/ghost
cd ghost
sudo chmod +x install.sh
sudo ./install.sh
Once the installation is complete just type the command “ghost” and this screen will be visible. Type help to get the menu.
Now we will see how to remotely access a vulnerable IP, for that I am using Shodan which is an online database listing vulnerable IPs. On Shodan search the following keywords “android debug bridge” on port 5555 which gives us the backdoor o any device if connected to the internet.
Pick a vulnerable TV from the search results. There is a catch here, not all devices are TV or connectable unless they have shell exposed. For faster results refine the search with the keyword “rockchip006” or “shell V2”. From the refined pool, selected an exposed Smart TV.
Use the following commands on the Ghost Framework to remotely connect to the above IP
set RHOST {IPV4 address}
run
Once the system gets connected the IP will become part of the command line interface and will be highlighted in red colour. Using commands like “wifi”, “sysinfo” and “battery” to know in-depth about the device firmware. Commands like netstat and activity will share the system logs.
In the screen capture below, we see the use of “shell” commands which helps us gain access to a shell in the root directory. Once we get into the shell, we can traverse the files in the root.
The exposed shell gave us access to the data, bin, config and sys directories which contains sensitive data and passwords.
We can get into the etc. folder and retrieve "passwd" file from it and just by performing a simple cat command, we can get the attain the credential s active on the system.
This experiment truly tells us how vulnerable the SMARTV systems are. In real time over the internet that their credentials are remotely accessible to everyone.
Thankyou!
Other Videos By Cloud Stitcher
2022-03-14 | Testing Camera && Setup HEHE |
2022-03-13 | Final Sweet Theives : Fall Guys |
2022-03-10 | Material Guys Theives : Fall Guys |
2022-03-09 | Try to a Boss : Hollow Knight |
2022-03-09 | Exploring the Caves : Hollow Knight |
2022-03-09 | Exploring the Caves : Hollow Knight |
2021-09-10 | Step 4 : Post Incident |
2021-09-10 | Step 3 : Remediation |
2021-09-10 | Step 2 : Detect & Analyse |
2021-09-10 | Step 1 : Prepare |
2021-05-07 | Hacking a Smart TV! - Android Debug Bridge Exploit |
2021-03-23 | Working Demo - Exploiting 5555 ADB to get into Smart TV and Phones (File Traversal / Hacking) |
2020-11-23 | Don't Starve Among Us Stream (Time to fall in love~) |
2020-11-23 | Don't Starve Among Us Stream (Time to fall in love~) |
2020-11-04 | Don't Starve Among Us Stream (Time to fall in love~) |
2020-10-29 | Bleh. Among Us || Paradox |
2020-10-26 | Cloud Stitcher Trying Raji |
2020-10-06 | Mastery of a Restaurant! [Korean Dialogue Delivery] Vallari [KSI, KCCI] |
2020-08-01 | Calming Vlog 1 - A Chill Day |
2020-06-23 | Sasta Live on a Bad Hair Day || Reading Webtoons |