Language Selection

English French German Italian Portuguese Spanish

Hacking the hotel through the TV

Filed under
Security

When Adam Laurie stays at hotels, he says he can hack his way around paying for premium TV channels, the minibar and phone calls.

What's more, by connecting his laptop to certain modern hotel TV systems, Laurie says he can spy on other guests. He can't look into their rooms (yet), but depending on the system he can see what they are watching on their TV, look at their guest folios, change the minibar bill and follow along as they browse the Internet on the hotel TV.

To tease his fellow guests, he can also check them out of their room and set early wake up calls via the TV.

Laurie can do all this because of what he calls the "inverted security model" of the systems. "The TV is controlling which content I get to see. The hotel in most cases is streaming all content without any control," Laurie said in a presentation Saturday at the Defcon event for security professionals and enthusiasts here.

By plugging the hotel TV cable into a USB TV tuner connected to a laptop computer, Laurie can hack his way into the back-end systems controlling the entertainment and other convenience features found in modern hotels, he said in his presentation.

He found that many of those systems give access to information depending on an ID associated with the room's TV. By changing that ID, he said that he was able to access information for other rooms. Many of such hotel systems show guest bills, phone and room service records and offer video check-out.

Laurie found that the hotel TV systems also have special controls for hotel employees. Housekeeping staff can report a room as clean, for example. Additionally, he found that some systems let room service staff input billing for the minibar, which he now controlled.

"Sometimes you can actually control physical devices," Laurie said. In one Holiday Inn hotel he found the system controlled an electronic lock on the minibar.

While staying at a Hilton hotel in Paris, Laurie automated his hack and placed a camera in front of the TV. He snapped pictures of every screen and found out the occupancy rate of the hotel, the names of the guests, what they were paying, where they were calling and how long they had been at the hotel. He showed the pictures at Defcon, but obscured the guest names.

Full Story.

More in Tux Machines

5 Reasons Your Company Should Open Source More Code

Given intense competition for the world's best engineering talent, can your company really afford to lock up its code behind proprietary licenses? Sure, if you're in the business of selling software, giving it all away may not make sense. But the vast majority of companies don't sell software, and should be contributing a heck of a lot more as open source. Read more

Docker chief operator: Why the open source container project is taking a new shape

With a quadrupling of contributors over the past year, the open-source Docker container project has unveiled a new structure aimed at dealing with that accelerating growth. The reorganisation, which itself went through the community's design process, is intended to increase Docker's openness and accessibility, and enable the project to increase in size massively without affecting core qualities, such as response times and good communication. Read more

Linux Kernel 3.18.4 Is Now the Most Advanced and Stable Version Available

A fresh version of the Linux kernel, 3.18.4, has been released by Greg Kroah-Hartman and is now available for download. This is now the most advanced version you can find and it will remain like this at least for the next couple of weeks. Read more

7 reasons asynchronous communication is better than synchronous communication in open source

Traditionally, open source software has relied primarily on asynchronous communication. While there are probably quite a few synchronous conversations on irc, most project discussions and decisions will happen on asynchronous channels like mailing lists, bug tracking tools and blogs. Read more