Language Selection

English French German Italian Portuguese Spanish

Hacking the hotel through the TV

Filed under
Security

When Adam Laurie stays at hotels, he says he can hack his way around paying for premium TV channels, the minibar and phone calls.

What's more, by connecting his laptop to certain modern hotel TV systems, Laurie says he can spy on other guests. He can't look into their rooms (yet), but depending on the system he can see what they are watching on their TV, look at their guest folios, change the minibar bill and follow along as they browse the Internet on the hotel TV.

To tease his fellow guests, he can also check them out of their room and set early wake up calls via the TV.

Laurie can do all this because of what he calls the "inverted security model" of the systems. "The TV is controlling which content I get to see. The hotel in most cases is streaming all content without any control," Laurie said in a presentation Saturday at the Defcon event for security professionals and enthusiasts here.

By plugging the hotel TV cable into a USB TV tuner connected to a laptop computer, Laurie can hack his way into the back-end systems controlling the entertainment and other convenience features found in modern hotels, he said in his presentation.

He found that many of those systems give access to information depending on an ID associated with the room's TV. By changing that ID, he said that he was able to access information for other rooms. Many of such hotel systems show guest bills, phone and room service records and offer video check-out.

Laurie found that the hotel TV systems also have special controls for hotel employees. Housekeeping staff can report a room as clean, for example. Additionally, he found that some systems let room service staff input billing for the minibar, which he now controlled.

"Sometimes you can actually control physical devices," Laurie said. In one Holiday Inn hotel he found the system controlled an electronic lock on the minibar.

While staying at a Hilton hotel in Paris, Laurie automated his hack and placed a camera in front of the TV. He snapped pictures of every screen and found out the occupancy rate of the hotel, the names of the guests, what they were paying, where they were calling and how long they had been at the hotel. He showed the pictures at Defcon, but obscured the guest names.

Full Story.

More in Tux Machines

Operating System U Fails To Live Up To Its Goals

After launching last month on Kickstarter, the project has turned into a failure and all development has ceased. Operating System U by Andrew Bernstein only raised $1,948 of its $50,000 goal over the month-long period for the OS that claimed numerous advantages over Ubuntu and Windows 8. Andrew then posted, "Unfortunately OS U was unsuccessful. I truly, truly appreciate everyone who backed us, but unfortunately since we where unsuccessful, combined with other circumstances, OS U will not have any more continued development." Read more

Calculate Intro, OpenMandriva Review, and Mageia Delay

Today in Linux news Jessie Smith has a nice article on Gentoo-derivative Calculate Linux 14 in this week's Distrowatch Weekly. Linuxbsdos.com has a review of OpenMandriva Lx 2014.1, released last week. Mageia 5 Beta 1 is delayed and openSUSE 11.4 is "truly, finally dead." We have all this and more in tonight's Linux news recap. Read more

Early Morning Linux Voodoo at Denny’s

I could tell that he wasn’t comfortable turning over control of his laptop to a stranger, but after a few seconds I got a slight nod to the affirmative. I pulled the Acer over to my part of the counter and booted the Linux Mint KDE LTS I keep for just such purposes. As the computer accepted the DataStick as the boot option, I explained to Ed what I was doing. It was obvious he had no idea what I was talking about so we waited in awkward silence for the next few seconds. Finally, the Mint logo appeared on the screen. I opened Dolphin and located the Windows drive then asked him for the name of the file. He couldn’t remember but was sure it was a PDF. A few minutes later, I pulled a pen from my pocket and wrote down the number he needed and slid it back over to him with his laptop. Read more

Leftovers: Proprietary Software and Command Line