
Calif.io on GitHub documents how they gave Codex a foothold on a Samsung television. Then it popped root.
We started with a shell inside the browser application on a Samsung TV, and a fairly simple question: if we gave Codex a reliable way to work against the live device and the matching firmware source, could it take that foothold all the way to root?
Codex had to enumerate the target, narrow the reachable attack surface, audit the matching vendor driver source, validate a physical-memory primitive on the live device, adapt its tooling to Samsung’s execution restrictions, and iterate until the browser process became root on a real compromised device.
We didn’t provide a bug or an exploit recipe. We provided an environment Codex could actually operate in, and the easiest way to understand it is to look at the pieces separately.
See the details of the exploits in the post here and on GitHub.
from Adafruit Industries – Makers, hackers, artists, designers and engineers! https://ift.tt/GLzcFO5
via IFTTT









