Re: Pen-Test Blackberry

From: Erin Carroll (amoeba@amoebazone.com)
Date: Tue Jun 27 2006 - 19:05:45 EDT


Here are a couple of things to check:

The BES will most likely be on the internal IP space and usually resides
in the same tier as internal webservers etc (but not in the DMZ). Some
orgaznizations firewall off particular internal servers dependent upon
department or similar to restrict internal access to information assets.
If this is the case in yuor org, try browsing to those internal webserber
IP's with a Blackberry handheld. Since the BES is the source connection
internally, your handheld will be able to bypass internal FW rules and
allow anyone with a BES-keyed blackberry to access those internal sites.
Rarely have I seen a BES infrastructure where that loophole is locked
down.

Someone else mentioned loss of handheld=unauthorized access to your
network/email/Intellectual Property. Make sure that proxy logging per SID
is enabled to allow for tracking.

On Tue, 27 Jun 2006, brown.scorpio1@gmail.com wrote:

> Hi List
>
> I have to pen-test a BES (Blackberry Enterprise Service) Infrastructure,
> which includes the Server, Blackberry Handhelds, Blackberry Desktop etc.
> But I am unable to find any exploitable loopholes in this. To add onto
> that, I would also like to know the security threats, vulnerabilities
> being faced by the blackberry devices, servers, etc.
>
> If any one can give inputs on this, I'll be very grateful.
>
> Thanks in advance.
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue to rise,
> you need to proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for details.
> ------------------------------------------------------------------------------
>
>

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:11 EDT