Overview
Discover how to remotely control every room in a luxury hotel through security flaws in their home automation system. Explore the anatomy of this attack, including reverse engineering the KNX/IP protocol, identifying deployment vulnerabilities, and creating an iPad Trojan to send commands from anywhere. Gain valuable insights into improving large-scale home automation architectures, understanding the risks of legacy protocols, insecure wireless connections, and unlocked commodity hardware. Learn about the potential consequences of these security flaws, from creating chaos to life-threatening scenarios, and understand the importance of robust security measures in hotel automation systems.
Syllabus
Introduction
Question
Who am I
What did I do
The Hotel
The iPad
KNX
Open Standard
No Security
IP Address
Conclusion
Implementing the Protocol
The IP Envelope
The KNX Address
Evaluations
One Light Bulb
Second Room
Collecting Information
No iPad
How it works
How many devices are connected
What does it mean
Hotel security policies
Internet of Things protocols
Whats the worst thing that could happen
You dont care about this
What can happen
Security
Taught by
Black Hat