Get the latest tech news

Samsung WB850F Firmware Reverse Engineering


Dissecting and symbol-mapping a camera firmware to get around WiFi hotspot mis-detection

Now that we have the function names in place, we need to manually set the type of quite a few DAT_ fields to "pointer", rename the parameters according to the debug string, and we get a reasonably usable decompiler output. To pass the hotspot check, we must unwind ten years of HTTPS-everywhere, or point the DNS record to a different server that will either HTTP-redirect to a different, more yahooey name, or set a cookie on the yahoo domain. The resulting patch was tiny, but guessing the workaround just from the packet traces was impossible due to the "detection method" implemented by Samsung's engineers.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Samsung

Samsung

Photo of engineering

engineering

Photo of Samsung WB850F

Samsung WB850F

Related news:

News photo

The Morning After: Samsung’s secret war on repair

News photo

Desperate to boost competitiveness, Samsung calls up old guard to run chip business

News photo

iFixit divorces Samsung over lack of real commitment to DIY repair program