Discover how to remotely control every room in a luxury hotel through security flaws in their home automation system. Explore the anatomy of this attack, including reverse engineering the KNX/IP protocol, identifying deployment vulnerabilities, and creating an iPad Trojan to send commands from anywhere. Gain valuable insights into improving large-scale home automation architectures, understanding the risks of legacy protocols, insecure wireless connections, and unlocked commodity hardware. Learn about the potential consequences of these security flaws, from creating chaos to life-threatening scenarios, and understand the importance of robust security measures in hotel automation systems.
Learn How to Control Every Room at a Luxury Hotel Remotely