Completed
Network data capture
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
To Dock or Not to Dock - Using Laptop Docking Stations as Attack Platforms
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 NCC Group
- 3 Why use docking stations as attack platforms
- 4 How docking stations work
- 5 Eseries dock connector
- 6 Eseries dock manual
- 7 Extended battery
- 8 Deconstruction
- 9 Hardware implant
- 10 Network data capture
- 11 Amphenol module
- 12 Network attack
- 13 Video attack
- 14 VGA port
- 15 USB and PST
- 16 Keystroke insertion
- 17 USB audio monitoring
- 18 Webcam monitoring
- 19 USB controller
- 20 USB bus
- 21 Proprietary dock connector
- 22 Control platform
- 23 Raspberry Pi
- 24 Power considerations
- 25 Putting it all together
- 26 No demo
- 27 Detecting hardware implants
- 28 Weighing docking stations
- 29 Infrared heat signature
- 30 Thermal imaging camera
- 31 Thanks
- 32 RF emanations
- 33 Current consumption
- 34 Preventing
- 35 Future research
- 36 Conclusions
- 37 Questions