To Dock or Not to Dock - Using Laptop Docking Stations as Attack Platforms

To Dock or Not to Dock - Using Laptop Docking Stations as Attack Platforms

Black Hat via YouTube Direct link

How docking stations work

4 of 37

4 of 37

How docking stations work

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

To Dock or Not to Dock - Using Laptop Docking Stations as Attack Platforms

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 NCC Group
  3. 3 Why use docking stations as attack platforms
  4. 4 How docking stations work
  5. 5 Eseries dock connector
  6. 6 Eseries dock manual
  7. 7 Extended battery
  8. 8 Deconstruction
  9. 9 Hardware implant
  10. 10 Network data capture
  11. 11 Amphenol module
  12. 12 Network attack
  13. 13 Video attack
  14. 14 VGA port
  15. 15 USB and PST
  16. 16 Keystroke insertion
  17. 17 USB audio monitoring
  18. 18 Webcam monitoring
  19. 19 USB controller
  20. 20 USB bus
  21. 21 Proprietary dock connector
  22. 22 Control platform
  23. 23 Raspberry Pi
  24. 24 Power considerations
  25. 25 Putting it all together
  26. 26 No demo
  27. 27 Detecting hardware implants
  28. 28 Weighing docking stations
  29. 29 Infrared heat signature
  30. 30 Thermal imaging camera
  31. 31 Thanks
  32. 32 RF emanations
  33. 33 Current consumption
  34. 34 Preventing
  35. 35 Future research
  36. 36 Conclusions
  37. 37 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.