Tools for analyzing EZCast / Miracast devices
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.
cgi Bulk push Jun 1, 2014
cross Bulk push Jun 1, 2014
deliverables paper Jun 1, 2014
flash Update README Jun 1, 2014
pics Bulk push Jun 1, 2014
python Bulk push Jun 1, 2014
.gitignore Initial commit Jun 1, 2014
LICENSE Initial commit Jun 1, 2014 typo Jun 3, 2014

Analyzing Chromecast & Miracast devices.

Tools for analyzing EZCast / Miracast devices, as part of a project paper.

This repository contains

  • some xcompiled tools (gdb, netcat) that can be used on mipsel devices such as the Measy A2W (trust us, we didn't backdoor them)
  • a backup of the NAND flash as found on the Measy A2W, potentially containing some helpful kernel modules that may assist in the reverse engineering of some of the underlying USB protocols (all am7x am8x based)
  • a tool by Antonio Ospite to extract firmware details for Actions-Micro devices

Key words: Measy A2W, Miracast, Chromecast, Actions-Micro, AM8251, AM8250, forensics, UART, ADFU, BREC


Google’s Chromecast and Miracast dongles are gadgets that allow people to stream movies and other media content to an HDMI-capable device. This paper atempts to find out what forensically interesting information is stored on both devices and how this information can be retrieved.

The Chromecast makes it difficult to obtain the NAND memory by encrypting the contents with a unique per device key. Attempts to retrieve this memory failed. However, contents of crash logs show that information with absolute timestamps is logged on the device. It suggests that information, including wireless access points and MAC addresses, is logged.

The Miracast dongle researched during this project, the Measy A2W, runs the EZCast firmware. EZCast contains multiple software vulner- abilities that may lead to shell access on similar devices. However, the method used to access the memory and flash on the Measy A2W was via the UART interface. A memory dump could then be retrieved over the network using netcat or via UART using hexdump. The memory of the Miracast contained information including partial images, links of visited websites, and MAC addresses of nearby and connected devices.

View paper