This presentation will cover the research I preformed analyzing the protocols used for HippoRemote, and iPhone application that turns your phone into an mouse/trackpad/keyboard and Synergy, software for remotely controlling multiple systems with a single mouse and keyboard. By intercepting these protocols on the wire, an attacker can inject malicious keystrokes to compromise a user's workstation.