[Q] Maxcast

Search This thread

LeftyGR

Senior Member
Oct 18, 2011
2,120
1,712
Bloomington, IL
So I've had a CC for 5-6 months. It's stock. A few weeks ago I noticed on my cc phone app it started asking me to set up MaxCast. Haven't found much via Google search. What I have found makes me believe it's something computer based. But I don't have my laptop on and have never downloaded anything. It shows up with and without the cc plugged in so it's not a weird firmware addition Google pushed to my device. And I don't have anything I installed on my phone...
So what the blank is this?
egymesud.jpg


<Note3>
 

Cuzz1369

Senior Member
Jan 25, 2013
4,060
4,458
Kitchener
Not possible. It's on my wireless network, which is locked down tight. And if it was someone else's cc, to name it would mean it's set up.

<Note3>

Its not on your wireless network. The app detects all Chromecast within range and asks you to set it up on your network.

Sent from my Nexus 7 using Tapatalk
 

LeftyGR

Senior Member
Oct 18, 2011
2,120
1,712
Bloomington, IL
Its not on your wireless network. The app detects all Chromecast within range and asks you to set it up on your network.

Sent from my Nexus 7 using Tapatalk

Sorry. That's not correct. Picture 1. What happens when you try to connect with wifi off.
ru3yhama.jpg


Picture 2. List of devices on my wifi network. ON my network, which is named "CodeBrown".
jy3e8ada.jpg


<Note3>
 

neu - smurph

Senior Member
May 14, 2013
276
89
Google Pixel 4a
If you check available wireless networks in Settings on your phone you'll see a unsecured Access Point on Channel 1 called Chromecast which is the 'MaxCast' waiting for something to connect to set up. It's probably your neighbours. Maybe they've gone away, turned of their wifi, but left their Chromecast powered up. A set up and powered up Chromecast that can't find it's preferred network will fire up it's internal Access Point waiting to be set up again. When they switch their wireless back on it will disappear.
 
  • Like
Reactions: LeftyGR

LeftyGR

Senior Member
Oct 18, 2011
2,120
1,712
Bloomington, IL
1st. @Cuzz1369 . Sorry for arguing.
2nd. So a cc device set up on someone else's wireless network is in proximity to mine and can actually be set up? That just seems...stoopid. I woulda thought once set up it would lock in the settings and be on one network. Hmm. Ok then. Thanks for everyone's input!

<Note3>
 

Cuzz1369

Senior Member
Jan 25, 2013
4,060
4,458
Kitchener
1st. @Cuzz1369 . Sorry for arguing.
2nd. So a cc device set up on someone else's wireless network is in proximity to mine and can actually be set up? That just seems...stoopid. I woulda thought once set up it would lock in the settings and be on one network. Hmm. Ok then. Thanks for everyone's input!

<Note3>

As someone else said, its not setup on a wireless network. Its looking for a home. Once its setup on a network it won't show up.

Sent from my Nexus 5 using Tapatalk
 

chateau1

Member
Sep 19, 2012
21
3
I remember reading somewhere on this forum that a rooted Chromecast in this condition (looking for a home) can be made to show the SSID and Passphrase of the owner who originally set it up if someone knows where to look. Am I correct in this or am I having a senior moment.

If the above is true will a stock Chromecast do the same thing (show critical information)?

One of my reasons for asking is I am seeing my neighbor's Chromecast and it is apparent he has set it up since it shows his name. Would like to be able to tell him if he is indeed vulnerable.
 
Last edited:

extrem0

Senior Member
Feb 7, 2012
1,209
474
Actually it's showing to be set up because his wifi router is off, out of range or he changed its password. Since it's not ChromecastXXXX it was already configured.
 

chateau1

Member
Sep 19, 2012
21
3
Actually it's showing to be set up because his wifi router is off, out of range or he changed its password. Since it's not ChromecastXXXX it was already configured.

Yes, I realize it has been set up but it is now broadcasting as an open network for someone to setup.

In the above condition, is the SSID and Passphrase of the original person's wifi network vulnerable to being seen by a third party?

Nothing to do with Chromecast but there are wifi thermostats that do the same thing (broadcast as an open network even though they have been setup but have lost connection to the original wifi network for some reason). I had one and never really felt comfortable with the thing doing this.
 
Last edited:

neu - smurph

Senior Member
May 14, 2013
276
89
Google Pixel 4a
Even if not a security risk per se is does allow for some potentially damaging practical jokes. Strategic highjack of your neighbours Chromecast and then cast some particularly unsavoury NSFW content on a loop. Marriage breaker........

Sent from my Cyclone Voyager using XDA Premium 4 mobile app
 

extrem0

Senior Member
Feb 7, 2012
1,209
474
Yes, I realize it has been set up but it is now broadcasting as an open network for someone to setup.

In the above condition, is the SSID and Passphrase of the original person's wifi network vulnerable to being seen by a third party?

Nothing to do with Chromecast but there are wifi thermostats that do the same thing (broadcast as an open network even though they have been setup but have lost connection to the original wifi network for some reason). I had one and never really felt comfortable with the thing doing this.
I'm almost sure it was already discussed in Eureka-ROM thread. If I recall correctly, someone said it's indeed possible to get the wifi passphrase by accessing an open Chromecast already set up. It'll be protected when the next webpanel is out.
I just tried to get my wifi passphrase accessing my chromecast, but it was encrypted. It looks like they already solved this issue.

Even if not a security risk per se is does allow for some potentially damaging practical jokes. Strategic highjack of your neighbours Chromecast and then cast some particularly unsavoury NSFW content on a loop. Marriage breaker........

Sent from my Cyclone Voyager using XDA Premium 4 mobile app

lol! Dangerous mind! Now we'll have to take care when moving.. :p

I think it's high unlikely you have an a*****e geek neighbour who is seeking for an unsecured chromecast (which need to be already set up and lost its connection) and will do any harm. The most probably to happen is someone setup it mistakenly thinking it's his/her's own chromecast and will cast a proper video (unless you also have a disturbed neighbour, which is quite unlikely too). But then he/she will eventually notice that did it by mistake, or yourself will notice something is wrong..
 
Last edited:

Asphyx

Senior Member
Dec 19, 2007
2,158
378
Android Wear
Google Pixel Watch
Well as I said in the other discussion....

Even if you got the Login Info you needed to connect to whatever network it was set up on....
If the CCast couldn't use the credentials to connect and stay out of AP Mode, how the hell can anyone else connect, What good is that Info? LOL

Can it be exploited by a really smart Hacker? Of Course but then again that same person s smart enough to hack the router without the need for a CCast in AP mode.
 

bhiga

Inactive Recognized Contributor
Oct 13, 2010
2,501
1,018
I remember reading somewhere on this forum that a rooted Chromecast in this condition (looking for a home) can be made to show the SSID and Passphrase of the owner who originally set it up if someone knows where to look. Am I correct in this or am I having a senior moment
Yes, this is true and Team-Eureka has it on their radar - once the web panel is secured, it will be as much of an issue as it is with other rooted Android devices.
FWIW, you can get the WiFi credentials in plaintext from the same file on my rooted Android phone, so likely the core problem of the credentials being stored in plaintext is inherent in Android itself.
The trouble with Chromecast is that it automatically makes itself available as an unsecured WiFi AP for setup.
Which is OK except for the fact that rooted firmware enable ADB/SSH/Telnet by default.
Which is also OK except for the fact that those can be (re)enabled via the Eureka web panel.
Which is OK except for the fact that anybody can get to the web panel, because anybody can connect to the Chromecast's unsecure AP.
So any break in the chain would fix things. Functionality-wise securing the web panel is the best solution - it doesn't break any stock functionality and doesn't remove any added functionality.

If the above is true will a stock Chromecast do the same thing (show critical information)?
No, because there isn't ADB, SSH or Telnet access to browse the filesystem.
Even if there was ADB/SSH/Telnet or some other way to browse the filesystem, without root you can't access the supplicant file.

One of my reasons for asking is I am seeing my neighbor's Chromecast and it is apparent he has set it up since it shows his name. Would like to be able to tell him if he is indeed vulnerable.
Your neighbor isn't vulnerable to his/her wireless credentials being let out (unless someone finds another way to hack Chromecast's setup mode). However, someone could easily "hijack" their Chromecast, associate with another network and push random content to it.
If they have HDMI-CEC enabled the hijacker could turn on their and play whatever they wanted to.
It's not really a huge security risk, but it's an annoyance, as the hijacker would be taking over your neighbor's TV, and they could push undesired content. Overall, the hijacker would probably get bored quickly as they wouldn't see any of the result, unless they're an immediate neighbor or spying on their in some other way.
 
  • Like
Reactions: neu - smurph

Top Liked Posts

  • There are no posts matching your filters.
  • 1
    Someone else in your area probably has a Chromecast and named it maxcast.

    Sent from my Nexus 7 using Tapatalk
    1
    Not really helpful, but ok. Explain why it lists the device on my wireless network?

    <Note3>

    Factory reset your Chromecast. It will show up the same way as the "max cast" does until you set it up.

    Sent from my Nexus 5 using Tapatalk
    1
    Not really helpful, but ok. Explain why it lists the device on my wireless network?

    <Note3>

    Because it detects it via WiFi, It sees the device in AP mode and is telling you you need to connect it to your network!
    1
    If you check available wireless networks in Settings on your phone you'll see a unsecured Access Point on Channel 1 called Chromecast which is the 'MaxCast' waiting for something to connect to set up. It's probably your neighbours. Maybe they've gone away, turned of their wifi, but left their Chromecast powered up. A set up and powered up Chromecast that can't find it's preferred network will fire up it's internal Access Point waiting to be set up again. When they switch their wireless back on it will disappear.
    1
    I remember reading somewhere on this forum that a rooted Chromecast in this condition (looking for a home) can be made to show the SSID and Passphrase of the owner who originally set it up if someone knows where to look. Am I correct in this or am I having a senior moment
    Yes, this is true and Team-Eureka has it on their radar - once the web panel is secured, it will be as much of an issue as it is with other rooted Android devices.
    FWIW, you can get the WiFi credentials in plaintext from the same file on my rooted Android phone, so likely the core problem of the credentials being stored in plaintext is inherent in Android itself.
    The trouble with Chromecast is that it automatically makes itself available as an unsecured WiFi AP for setup.
    Which is OK except for the fact that rooted firmware enable ADB/SSH/Telnet by default.
    Which is also OK except for the fact that those can be (re)enabled via the Eureka web panel.
    Which is OK except for the fact that anybody can get to the web panel, because anybody can connect to the Chromecast's unsecure AP.
    So any break in the chain would fix things. Functionality-wise securing the web panel is the best solution - it doesn't break any stock functionality and doesn't remove any added functionality.

    If the above is true will a stock Chromecast do the same thing (show critical information)?
    No, because there isn't ADB, SSH or Telnet access to browse the filesystem.
    Even if there was ADB/SSH/Telnet or some other way to browse the filesystem, without root you can't access the supplicant file.

    One of my reasons for asking is I am seeing my neighbor's Chromecast and it is apparent he has set it up since it shows his name. Would like to be able to tell him if he is indeed vulnerable.
    Your neighbor isn't vulnerable to his/her wireless credentials being let out (unless someone finds another way to hack Chromecast's setup mode). However, someone could easily "hijack" their Chromecast, associate with another network and push random content to it.
    If they have HDMI-CEC enabled the hijacker could turn on their and play whatever they wanted to.
    It's not really a huge security risk, but it's an annoyance, as the hijacker would be taking over your neighbor's TV, and they could push undesired content. Overall, the hijacker would probably get bored quickly as they wouldn't see any of the result, unless they're an immediate neighbor or spying on their in some other way.