Description: |
This presentation will demonstrate how an attacker could utilize many typical corporate blackberry deployments to directly attack machines on the internal network��behind your perimiter defenses! The tools and source code presented will be available for attendees. Techniques for reducing the risks associated with this technology will also be presented. NOTE: This link is not yet active, please check back as this software will be made available for download soon. Thank you.
|