Blackberry JAVA DEVELOPMENT ENVIRONMENT - - FUNDAMENTALS GUIDE Specifiche Pagina 22

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 39
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 21
Attack Surface Analysis of BlackBerry Devices
Mitigation
You can set the following options to mitigate the attacks outlined above. See Mitigation Strategies for more
information.
Bluetooth Backdoor and Bluetooth Worm
Email
Email can be sent, received, and read via the net.rim.blackberry.api.mail package, but only by signed
applications. Any kind of attachment can be sent via email, but only supported attachments can be viewed
on the BlackBerry. The user needs a service provider which offers the BlackBerry attachment service in
order to view these attachments. This service processes the attachment content before it is sent to the
BlackBerry in the UCS (Universal Content Stream) format. The file types supported by the BlackBerry
attachment service include: .doc, .pdf, .txt, .wpd, .xls, and .ppt.
11
Executable content such as .cod files are
not supported attachments.
Email Interception
A malicious signed application can allow third parties to send messages from the affected BlackBerry and
also read all received messages. Note that a variety of communication channels could be employed to get
the email data off the device and instruct the sending of emails, such as SMS, TCP socket, etc.
Backdoor
A malicious signed application could use email as a command and control channel. It could use email to
receive instructions to carry out certain actions such as modifying or stealing sensitive data. In addition,
such an application could be set up as a spam relay or message proxy.
Worm
A malicious signed application can send a message containing a link to a .jad file (Java Application
Descriptor). If a user opens this link, they will be prompted to install the worm code from a remote Web site.
The scenario would be as follows:
Attacker hosts malicious .cod application file on a Web server:
http://www.badsite.com/game.cod
22
IT Policy "Disable Bluetooth" = True
Application Controls "Bluetooth Serial Profile" = Not Permitted
Device Firewall Status = Enabled
Application Permissions Connections > Bluetooth = Deny
Other Device Settings Options > Bluetooth > Disable Bluetooth
Vedere la pagina 21
1 2 ... 17 18 19 20 21 22 23 24 25 26 27 ... 38 39

Commenti su questo manuale

Nessun commento