Главная
Study mode:
on
1
Introduction
2
Question
3
Who am I
4
What did I do
5
The Hotel
6
The iPad
7
KNX
8
Open Standard
9
No Security
10
IP Address
11
Conclusion
12
Implementing the Protocol
13
The IP Envelope
14
The KNX Address
15
Evaluations
16
One Light Bulb
17
Second Room
18
Collecting Information
19
No iPad
20
How it works
21
How many devices are connected
22
What does it mean
23
Hotel security policies
24
Internet of Things protocols
25
Whats the worst thing that could happen
26
You dont care about this
27
What can happen
28
Security
Description:
Discover how to remotely control every room in a luxury hotel through security flaws in their home automation system. Explore the anatomy of this attack, including reverse engineering the KNX/IP protocol, identifying deployment vulnerabilities, and creating an iPad Trojan to send commands from anywhere. Gain valuable insights into improving large-scale home automation architectures, understanding the risks of legacy protocols, insecure wireless connections, and unlocked commodity hardware. Learn about the potential consequences of these security flaws, from creating chaos to life-threatening scenarios, and understand the importance of robust security measures in hotel automation systems.

Learn How to Control Every Room at a Luxury Hotel Remotely

Black Hat
Add to list
0:00 / 0:00