Learn How To Control Every Room at a Luxury Hotel Remotely The Dangers of Insecure Home Automation Deployment

by Jesus Molina
Sept. 21, 2017 0 comments www.blackhat.com belen_caty Pen Testing & Audits attack internet of things

This talk provides a detailed discussion of the anatomy of the attack: an explanation of reverse engineering of the KNX/IP home automation protocol; a description of the deployment flaws; blueprints on how to create an iPad Trojan to send commands outside the hotel; and, of course, solutions to avoid all these pitfall in future deployments. Attendees will gain valuable field lessons on how to improve wide scale home automation architectures and discussion topics will include the dangers of utilizing legacy but widely used automation protocols, the utilization of insecure wireless connection, and the use of insecure and unlocked commodity hardware that could easily be modified by an attacker.

https://www.blackhat.com/us-14/archives.html#learn-how-to-control-every-room-at-a-luxury-hotel-re...