PREFACE: I am going to ask for some help doing something requiring information that could be misused. If you have answers for me but are not comfortable sharing them with the entire forum, please PM me and we can communicate privately. Thank you.
I have a networked over-the-air DVR that is wonderful and at the same time frustrating. The Korean company that made it has stopped supporting it and is either going out of business or changing directions entirely. Requests from dozens if not hundreds of owners for them to release the source code or the device have gone unanswered, even though the device runs on linux and the have the GPL included in their documentation. I really don't have the resources to sue them.
What I would like to do is make a few modifications to the menus and network structure of the device to make it more user friendly in my home environment - a few symlinks and the like, and possibly add a service or two and some connections to internet streaming pages. Of course, they have made it nearly impossible to get into the box itself. When they update the box, it is done over the internet via a coded firmware update.
What I want to do is have a shot at getting in to it. I realise I may brick it or be unable to do anything once in, but I'd like to try anyway. The device has five open ports and I'd like to ssh into it. Anyone old hackers on here know any backdoor ways to get this done? Here's what I know so far:
Not shown: 995 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
139/tcp open netbios-ssn
445/tcp open microsoft-ds
6881/tcp open bittorrent-tracker
I also know it's MAC address. The device runs off flash memory and has an internal (removable) hard drive used for storage. The http port puts you on a broswer based remote control page. I can ftp, samba and nfs transfer files to/from it.
Suggestions?
I have a networked over-the-air DVR that is wonderful and at the same time frustrating. The Korean company that made it has stopped supporting it and is either going out of business or changing directions entirely. Requests from dozens if not hundreds of owners for them to release the source code or the device have gone unanswered, even though the device runs on linux and the have the GPL included in their documentation. I really don't have the resources to sue them.
What I would like to do is make a few modifications to the menus and network structure of the device to make it more user friendly in my home environment - a few symlinks and the like, and possibly add a service or two and some connections to internet streaming pages. Of course, they have made it nearly impossible to get into the box itself. When they update the box, it is done over the internet via a coded firmware update.
What I want to do is have a shot at getting in to it. I realise I may brick it or be unable to do anything once in, but I'd like to try anyway. The device has five open ports and I'd like to ssh into it. Anyone old hackers on here know any backdoor ways to get this done? Here's what I know so far:
Not shown: 995 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
139/tcp open netbios-ssn
445/tcp open microsoft-ds
6881/tcp open bittorrent-tracker
I also know it's MAC address. The device runs off flash memory and has an internal (removable) hard drive used for storage. The http port puts you on a broswer based remote control page. I can ftp, samba and nfs transfer files to/from it.
Suggestions?
Comment