When Google introduced its brand new Chromecast streaming dongle, the reaction from the technology world was divided in two ideologies. Some shrugged their shoulder muscles and stated that it do absolutely nothing that Apple TV and AirPlay did not already do. Other people lauded the opportunities made by Google’s cross-platform strategy to some thing that had been an Apple-only affair before. We lay somewhere in middle of these two different options, but now we are having more excited, and with very good reason.
The people over at GTVHacker discovered this exploit. As you already know the Chromecast is designed to be running a simple version of ChromeOS although the people at GTVHacker believe that it will be even more of a customized Google TV Release. It seems that the bootloader, init scripts, binaries and kernel are from the Google TV. This permitted GTVHackers their access.
You may also like these
- Google Fiber TV App Released For iPad [Direct Download Links]
- How To Get R/W Root Access Using iOS 7 Beta 1 Of iPhone 4 : No Jailbreak
- Google Places For Business App Released For iPhone, iPad And iPod Touch
- Google Released Voice Search Feature in Latest Chrome 27 Much Like Google Now
Google Chromecast Root Access Released
They have been ready to make an exploit that enables people to get a root shell by means of port 23 through telnet of the device. Although this is certainly exciting by itself, Google could send an update to this dongle and shut this loop-hole. The team describes the loop-hole:
“By holding down the single button, while powering the device, the Chromecast boots into USB boot mode. USB boot mode looks for a signed image at 0×1000 on the USB drive. When found, the image is passed to the internal crypto hardware to be verified, but after this process the return code is never checked! Therefore, we can execute any code at will.”
The GTVHacker’s Wiki page serves this file and if you really feel like fiddling with it you may download from there. Although this reports does not indicate much for the regular person, it absolutely was only a subject of time just before somebody would try to use the Chromecast. Click the source link below for a complete thorough explanation of precisely how the exploit operates. If you are fascinated in viewing it in action you can have a look at the YouTube video here!