Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

Performing BlackBerry Forensics > Information Hiding in a BlackBerry - Pg. 313

ForensicAnalysisofMobileMalware·Chapter9 313 Attacking the BlackBerry Several tools and methods are available that allow you to attack a BlackBerry. The first tool is the BlackBerry Attack Toolkit, which along with the BBProxy software can be used to exploit Web site vulnerabilities. The second tool is the Attack Vector, which links and tricks users by downloading malicious software to the BlackBerry. Another method is that of hijacks (or blackjacks). As the name implies, this allows someone to hijack a legal user's BlackBerry device and replace it on the network with a potentially harmful alternative device. Are You Owned? Attacking the BlackBerry "Attack vector" links trick users into downloading malicious software. "Blackjack" or "hijack" programs take over a BlackBerry device and replace them with malicious