Blackjacking - 0wning the Enterprise via the Blackberry - slides
This presentation will demonstrate how an attacker could utilize many typical corporate blackberry deployments to directly attack machines on the internal network¡ªbehind your perimiter defenses! The tools and source code presented will be available for attendees. Techniques for reducing the risks associated with this technology will also be presented. NOTE: This link is not yet active, please check back as this software will be made available for download soon. Thank you.