Penetration Testing mailing list archives

Re: Pen-Test Blackberry


From: Erin Carroll <amoeba () amoebazone com>
Date: Tue, 27 Jun 2006 23:05:45 +0000 (UTC)


Here are a couple of things to check:

The BES will most likely be on the internal IP space and usually resides in the same tier as internal webservers etc (but not in the DMZ). Some orgaznizations firewall off particular internal servers dependent upon department or similar to restrict internal access to information assets. If this is the case in yuor org, try browsing to those internal webserber IP's with a Blackberry handheld. Since the BES is the source connection internally, your handheld will be able to bypass internal FW rules and allow anyone with a BES-keyed blackberry to access those internal sites. Rarely have I seen a BES infrastructure where that loophole is locked down.

Someone else mentioned loss of handheld=unauthorized access to your network/email/Intellectual Property. Make sure that proxy logging per SID is enabled to allow for tracking.



On Tue, 27 Jun 2006, brown.scorpio1 () gmail com wrote:

Hi List

I have to pen-test a BES (Blackberry Enterprise Service) Infrastructure, which includes the Server, Blackberry Handhelds, Blackberry Desktop etc. But I am unable to find any exploitable loopholes in this. To add onto that, I would also like to know the security threats, vulnerabilities being faced by the blackberry devices, servers, etc.

If any one can give inputs on this, I'll be very grateful.

Thanks in advance.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: