Insteon home automation devices communicate via proprietary protocols riding over powerlines and sub-gigahertz RF. While Insteon has been making homes smarter for a decade, reverse engineering of the protocol by security professionals has only recently begun.? At DEF CON 23 Peter Shipley reverse engineered much of the Insteon wireless protocol, demonstrated that Insteon's public whitepaper was largely bogus, and that there was no evidence of network security. We agree with Joshua Wright that ""Security does not improve until tools for practical exploration of the attack surface become available,"" so we set out to build such tools for Insteon. In this presentation we'll show how Shipley got it (mostly) right about the Insteon protocol, while also showing off significantly more advanced tools for sniffing and traffic injection. These tools include a powerful Wireshark dissector and a network scanner/enumerator.