kopia lustrzana https://github.com/RootMyTV/RootMyTV.github.io
Move troubleshooting and blind mode into seperate files in docs folder
rodzic
28a2584e91
commit
ae4c0eee9b
45
README.md
45
README.md
|
@ -40,53 +40,14 @@ we cannot make any guarantees. This may void your warranty.
|
|||
mkdir -p ~/.ssh && curl https://github.com/USERNAME.keys > ~/.ssh/authorized_keys
|
||||
```
|
||||
|
||||
For exploiting broken TVs, check out the information [here.](./docs/HEADLESS.md)
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
In case of any problems [join the OpenLGTV Discord server](https://discord.gg/xWqRVEm)
|
||||
and ask for help on `#rootmytv` channel, or file a GitHub issue.
|
||||
|
||||
- Check if LG Connect Apps is enabled
|
||||
- Verify if http://localhost:3000 works in webOS system browser
|
||||
- After an initial reboot an unauthenticated telnet service (port 23) is exposed.
|
||||
In case of any issues it can be used for debugging. Additionally, if an error
|
||||
occurs during Homebrew Channel install, the bootstrap shell script is removed,
|
||||
and the TV should return to original state after a reboot. Then, rooting may be
|
||||
reattempted.
|
||||
|
||||
TODO: quick tutorial on how to launch the exploit (or maybe link to a separate .md?)
|
||||
|
||||
TODO: link to seperate .md file for further details/troubleshooting?
|
||||
|
||||
TODO: link to discord for support etc?
|
||||
|
||||
## Blind deployment
|
||||
|
||||
A TV with a broken screen can be rooted quite easily, turning it into a useful platform
|
||||
for further research.
|
||||
|
||||
[The exploit](https://rootmy.tv) can be saved to a local disk on (Ctrl-S...) a
|
||||
"normal" browser running on a local network. After opening the resulting
|
||||
`index.html` file a prompt will be shown asking for an IP address of a TV to
|
||||
perform rooting on. This can help when rooting a TV without a working display.
|
||||
|
||||
0. Check if the TV responds on HTTP port 3000 (http://your-tv:3000) - if it does,
|
||||
you can skip step 1 as it already has LG Connect Apps enabled.
|
||||
1. Enable LG Connect Apps (Key sequence likely depends on webOS version, this
|
||||
is documented for webOS 3.8)
|
||||
- Long press "Quick Settings" on Magic Remote (or press "Quick Settings"
|
||||
once, ↑, OK)
|
||||
- Wait a couple of seconds...
|
||||
- 3x ↓
|
||||
- 1x →
|
||||
- 4x ↓ (or as many as possible, LG Connect Apps is the last item in the
|
||||
menu)
|
||||
- OK (open submenu)
|
||||
- OK (enable)
|
||||
- Exit (or press back multiple times)
|
||||
2. Run an exploit in an external browser providing an IP address of a TV
|
||||
3. When asked for a connection prompt after a couple of seconds, press → and OK
|
||||
4. TV should reboot after a while and should start responding to unauthenticated
|
||||
telnet connections on its IP address.
|
||||
Before asking for support, please consult our [Troubleshooting guide.](./docs/TROUBLESHOOTING.md)
|
||||
|
||||
# Research Summary and Timeline
|
||||
|
||||
|
|
|
@ -0,0 +1,28 @@
|
|||
## Blind Deployment
|
||||
|
||||
A TV with a broken screen can be rooted quite easily, turning it into a useful platform
|
||||
for further research.
|
||||
|
||||
[The exploit](https://rootmy.tv) can be saved to a local disk on (Ctrl-S...) a
|
||||
"normal" browser running on a local network. After opening the resulting
|
||||
`index.html` file a prompt will be shown asking for an IP address of a TV to
|
||||
perform rooting on. This can help when rooting a TV without a working display.
|
||||
|
||||
0. Check if the TV responds on HTTP port 3000 (http://your-tv:3000) - if it does,
|
||||
you can skip step 1 as it already has LG Connect Apps enabled.
|
||||
1. Enable LG Connect Apps (Key sequence likely depends on webOS version, this
|
||||
is documented for webOS 3.8)
|
||||
- Long press "Quick Settings" on Magic Remote (or press "Quick Settings"
|
||||
once, ↑, OK)
|
||||
- Wait a couple of seconds...
|
||||
- 3x ↓
|
||||
- 1x →
|
||||
- 4x ↓ (or as many as possible, LG Connect Apps is the last item in the
|
||||
menu)
|
||||
- OK (open submenu)
|
||||
- OK (enable)
|
||||
- Exit (or press back multiple times)
|
||||
2. Run an exploit in an external browser providing an IP address of a TV
|
||||
3. When asked for a connection prompt after a couple of seconds, press → and OK
|
||||
4. TV should reboot after a while and should start responding to unauthenticated
|
||||
telnet connections on its IP address.
|
|
@ -0,0 +1,16 @@
|
|||
# Troubleshooting
|
||||
|
||||
TODO:
|
||||
restructure this to have a subheading for each problem/symptom,
|
||||
followed by bulletpoints for potential solutions.
|
||||
|
||||
ideally we will keep this updated as new problems inevitably arise
|
||||
/TODO
|
||||
|
||||
- Check if LG Connect Apps is enabled
|
||||
- Verify if http://localhost:3000 works in webOS system browser
|
||||
- After an initial reboot an unauthenticated telnet service (port 23) is exposed.
|
||||
In case of any issues it can be used for debugging. Additionally, if an error
|
||||
occurs during Homebrew Channel install, the bootstrap shell script is removed,
|
||||
and the TV should return to original state after a reboot. Then, rooting may be
|
||||
reattempted.
|
Ładowanie…
Reference in New Issue