Overview
Syllabus
Introduction
NCC Group
Why use docking stations as attack platforms
How docking stations work
Eseries dock connector
Eseries dock manual
Extended battery
Deconstruction
Hardware implant
Network data capture
Amphenol module
Network attack
Video attack
VGA port
USB and PST
Keystroke insertion
USB audio monitoring
Webcam monitoring
USB controller
USB bus
Proprietary dock connector
Control platform
Raspberry Pi
Power considerations
Putting it all together
No demo
Detecting hardware implants
Weighing docking stations
Infrared heat signature
Thermal imaging camera
Thanks
RF emanations
Current consumption
Preventing
Future research
Conclusions
Questions
Taught by
Black Hat