Saturday, December 2, 2023

Pentesting with Killcast Tool to Manipulate Chromecast Devices in Your Network

Recently HackerGiraffe and j3ws3r hijacked more than 70,000 Chromecasts to make people aware about the security risks of devices exposed to internet and promoted Pewdiepie.

They took advantage of exposed UPnP ports of home routers to hijack Chromecast devices and play their content.

Inspired from this hack, thewhiteh4t has created killcast, an open source tool for testing and research purposes, it’s available on GitHub, if you have a Google Home or Chromecast you can test and learn how simple it is to manipulate these devices if they are exposed or if you are in the same network.

What Happened

Almost all routers have UPnP enabled by default but home routers are not supposed to be exposed publicly, but in this case thousands of such routers were visible on Shodan, a search engine that lets user find specific types of devices exposed publicly.

Chromecast has two protocols, DIAL Protocol over SSDP and mDNS Server.

DIAL – DIscovery And Launch is a protocol that devices use to discover and launch apps from other devices.

SSDP – Simple Service Discovery Protocol is the basis of discovery protocol of UPnP and is intended for use in residential and small office environments.

A web-server runs on port 8008, and if you send specific GET, POST or DELETE requests, you can easily manipulate Chromecast devices, for exact requests you can study the python file in killcast.


At the time of writing killcast performs 5 actions :

  • Extract Interesting Information such as Build Version, Country, Timezone etc
  • Rename Device
  • Reboot Device
  • Perform Factory Reset
  • Kill Active Applications such as Youtube

Killcast is unable to play YouTube videos on demand like CastHack because as soon as CastHack attack was launched, Google released a Hotfix.


Killcast is a python3 script and works on popular linux distro like Kali Linux and Ubuntu, you can also run killcast on Termux for android.

Installation is very simple and requires python3 and requests module.

xgit clone
cd killcast
apt-get install python3
pip install requests


python3 -h
usage: [-h] –t IP
Manipulate Chromecast Devices in your Network
optional arguments:
-h, –help   show this help message and exit
 –t IP, —ip IP  IP Address of Chromecast

python3 -t


Author & Credits: thewhiteh4t


Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles