07:20 PM
Connect Directly

Hacking The Laptop Docking Station

Black Hat Europe researcher builds prototype device that could be used to steal corporate data, listen in on voice calls, videoconferences

You know that docking station you snap your laptop into at the office? It can be hacked, too.

A British researcher next month at Black Hat Europe will show just how valuable those seemingly benign devices can be to a determined attacker targeting an organization or group of users. Andy Davis, research director for U.K.-based NCC Group, built a prototype hardware device that can easily be placed inside a laptop docking station to sniff traffic and, ultimately, steal sensitive corporate communications information from the laptop.

"You see docking stations all over the place in organizations because people are using hot-desking type environments, so different laptops can be attached to [the docks] each day," Davis says. "And they are considered a trusted part of the infrastructure: Nobody thinks someone might tamper with one or swap one for another. Admins are more concerned with protecting your laptop: That's where the money is and the information."

But Davis says docking stations, which are rarely secured physically, can easily be rigged with rogue devices that intercept everything from data traffic to USB devices to softphones to videoconference traffic, even if it's encrypted. "If you have access to a dock, you have information on all the other ports, such as softphones or videoconference traffic ... It can capture traffic before it's encrypted and after it's decrypted."

The attacker would need physical access to the docking station, which Davis found has plenty of open space in its internals. "There's some electronics in there, but there is space for additional electronics to be put in there," he says.

He built his proof-of-concept with a Dell docking station -- only because it's one his company uses, he says -- and a single-board Raspberry Pi computing device running Wireshark, which he inserted inside the docking station itself. Adding the hardware was simple: The docks have plenty of open space in their internals, Davis says.

same as caption
A look inside a "clean" docking station

With a permanent connection to the network and a power supply, these devices could be an attractive entry for a targeted attack, he says. "It's a potential piece of interception equipment, and it blends in with the office environment," he says. "And if an attacker gets access to the doc, he has access to all information on the other ports."

It's just another example of how even the most low-profile hardware can be abused to give an attacker a foothold into an organization. Researchers at Rapid7 this week said they found that between 40 and 50 million networked devices are wide open to attack over the Internet via flaws in the pervasive Universal Plug and Play (UPnP) protocol that's enabled by default in most printers, routers, network-attached storage, IP cameras, media players, smart TVs, and even video game consoles.

[Unplug Universal Plug And Play (UPnP) to protect routers, storage devices, media players from getting hacked over the Internet, Rapid7 say. See Millions Of Networked Devices In Harm's Way.]

Unlike the UPnP vulnerabilities plaguing those devices, the docking station hack is more about weak physical security and valuable access, much like a point-of-sale PIN pad or an ATM machine, both of which have been plagued by skimmer-type attacks for several years now. "It's a similar concept where you're trying to collect information and remotely gain access via a covert channel," Davis says. "With a POS, if you have an implant collecting credit- and debit-card numbers and PINs, it will send that information wirelessly back to the attacker. That's a similar kind of approach I'm taking here" with the docking station hack, he says.

The most likely attack scenario for docks, he says, would be industrial espionage. "And someone would have to go in and [rig] the devices," he says. "Or a situation where someone would swap out a docking station with one with an implant in it. It could be an office cleaner or a contractor."

Dock with the Raspberry Pi-based Spy-Pi implant
Docking station with Davis' Raspberry Pi-based "Spy-Pi" implant

Davis says the best way to protect docking-station tampering is to outfit the equipment with anti-tampering features. A thermal imaging camera can detect whether a docking station has been compromised. "If there's an implant, bright red spots show up" on the camera view, he says.

Or a more basic approach would be to benchmark the normal weight of the device, for instance.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.