Blackjacking – 0wning the Enterprise via the Blackberry

Research in Motion's Blackberry technology has
quickly become the defacto standard for executives and technical
personnel alike to maintain unteathered remote access to critical data.
Often regarded as inherently secure, most administrators deploy this
solution without a full understanding of the technology or risks
involved.

This presentation
will demonstrate how an attacker could utilize many typical corporate
blackberry deployments to directly attack machines on the internal
network—behind your perimiter defenses! The tools and source code
presented will be available for attendees. Techniques for reducing the
risks associated with this technology will also be presented.

Presentation made at DefCon 14 by Jesse D'Aguanno.  Download the PowerPoint Sides and download the Blackberry Attack ToolkitFrom.

Advertisements

Author: Xavier Ashe

Entrepreneur, Infosec Executive, CISSP, CISM, Ironman triathlete, traveler, UU, paleo, father of 8, goyishe, gamer, & geek. http://linkedin.com/in/xavierashe

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s