Google Chromecast has already been rooted by the experts at GTVHacker. According to the hackers, Chromecast’s security exploit has been used to root it successfully. Google might patch this security hole anytime soon, so if you are not planning to develop anything for the device, then you might postpone the rooting. But if you are curious to put your hands on it, then just go ahead and follow the instructions given below.
Disclaimer: Pl. follow the below steps at your own risk. Techglimpse.com is not responsible for any damage that may cause.
Get ready with these…
* Blank USB Flash drive (at least 128MB) –Your drive will be erased–
* Google Chromecast
* Our USB Image
* Powered Micro USB OTG Cable
Pre-Setup:
Step 1: Download .zip and extract the “gtvhacker-chromecast.bin” file.
Step 2: You will have to install image as a whole to your USB flash drive with dd:
dd if=gtvhacker-chromecast.bin of=/dev/sdX bs=1024
Now the root process…
Step 1: Plug the flashdrive into one female “A” end of the USB OTG cable and connect Chromecast to the other end.
Step 2: Press and hold down the button on the Chromecast while plugging to the power cord.
Step 3: Keep an eye on the screen and for any blinking light on your flash drive. The Chromecast will power up, execute our (GTVHacker) unsigned kernel, kick off to a script that replaces /system with a rooted one. The data will be erased and the system will reboot as normal. The process will take about a minute and remember to not connect anything during the process.
Step 4: Once the process is completed, your box will reboot, and you will see a new splash screen, and then the Setup screen. Just re-set up your Chromecast, and you can telnet to get a root shell on your Chromecast on port 23!
That’s it! Thanks to the experts at GTVhacker.