Blackberry JAVA DEVELOPMENT ENVIRONMENT - - FUNDAMENTALS GUIDE Specifikace

Procházejte online nebo si stáhněte Specifikace pro Software Blackberry JAVA DEVELOPMENT ENVIRONMENT - - FUNDAMENTALS GUIDE. Blackberry JAVA DEVELOPMENT ENVIRONMENT - - FUNDAMENTALS GUIDE Specifications Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - BlackBerry Devices

WHITE PAPER: SYMANTEC SECURITY RESPONSEAttack SurfaceAnalysis ofBlackBerry DevicesJames O’ConnorSymantec Security Response, Ireland

Strany 2

Attack Surface Analysis of BlackBerry DevicesDevice FirewallFirewall options can be set on the BlackBerry by going to the following menu:Options >

Strany 3

Attack Surface Analysis of BlackBerry DevicesIT PolicySource: Protecting the BlackBerry device platform against malware.9Application Control PolicyPol

Strany 4

Attack Surface Analysis of BlackBerry DevicesApplication Control Policy (continued)Source: Protecting the BlackBerry device platform against malware.9

Strany 5 - Introduction

Attack Surface Analysis of BlackBerry DevicesApplication PermissionsSee the section titled "BIS Deployment" for information on how to setup

Strany 6 - Architecture Overview

Attack Surface Analysis of BlackBerry DevicesLegend:F: Firewall A: Application Control/Permissions I: IT Policy O: Other Device SettingsAll but one of

Strany 7 - Malicious Code Signing

Attack Surface Analysis of BlackBerry Devicesexhibit similar behavior.18Typically however the screen which presents the contents of the .jad file is o

Strany 8 - BIS Deployment

Attack Surface Analysis of BlackBerry DevicesBlackBerry Persistence Model• Proprietary• Application needs to be signed• Can store any object that impl

Strany 9

Attack Surface Analysis of BlackBerry Devicesthey may not pose a risk to the BlackBerry itself, they may infect other computers that the BlackBerry is

Strany 10 - BES Deployment

Attack Surface Analysis of BlackBerry DevicesAuto start-up and Background processesSigned applications can start themselves automatically whenever the

Strany 11

Attack Surface Analysis of BlackBerry Devices• User downloads and runs an application (e.g. game with "post my high-score online" option).•

Strany 13 - Attack Surface Analysis

Attack Surface Analysis of BlackBerry DevicesSMS BackdoorA signed malicious application could use SMS as a command and control channel for a backdoor.

Strany 14 - JAD Files

Attack Surface Analysis of BlackBerry DevicesBluetoothThe BlackBerry Pearl 8100 has increased Bluetooth support compared to some of its predecessors.

Strany 15 - Persistent Storage

Attack Surface Analysis of BlackBerry DevicesMitigationYou can set the following options to mitigate the attacks outlined above. See Mitigation Strate

Strany 16 - USB Mass Storage

Attack Surface Analysis of BlackBerry Devices• Along with matching .jad file:http://www.badsite.com/game.jad• Attacker starts worm by sending an email

Strany 17 - Memory and Processes

Attack Surface Analysis of BlackBerry DevicesBackdoorWormPIM Data (Personal Information Manager Data)The PIM Database stores Contacts, Events, and To-

Strany 18 - Premium Rate Scam

Attack Surface Analysis of BlackBerry DevicesData TheftA malicious signed application could read all the PIM data (including that mentioned in the tab

Strany 19 - SMS Interception

Attack Surface Analysis of BlackBerry Devicesattacker may be able to obtain another BlackBerry SIM from the same network provider, which uses thesame

Strany 20 - SMS Backdoor

Attack Surface Analysis of BlackBerry DevicesBackdoorA malicious application could establish a connection to the attacker, and then accept commands th

Strany 21 - Bluetooth Worms

Attack Surface Analysis of BlackBerry DevicesProxy/Firewall BypassBackdoorPort ScanHTTP / WAPThe BlackBerry supports HTTP and WAP connections via the

Strany 22 - Backdoor

Attack Surface Analysis of BlackBerry DevicesApplication sends:http://www.badsite.com/whatnow?Web site returns:COMMAND=DELETE_ALL EMAILCOMMAND=FORWARD

Strany 23

White Paper: Symantec Security ResponseContentsIntroduction...

Strany 24

Attack Surface Analysis of BlackBerry DevicesBackdoorHTTP ProxyTelephonyThe telephony API net.rim.blackberry.api.phone cannot be utilized by unsigned

Strany 25 - TCP/IP Connections

Attack Surface Analysis of BlackBerry DevicesSigned applications can also invoke the phone application that comes with the BlackBerry to initiate phon

Strany 26 - Proxy/Firewall Bypass

Attack Surface Analysis of BlackBerry DevicesPhoneCall.getDTMFTones() method to retrieve the string of tones entered by the user and hence their PINco

Strany 27 - Port Scan

Attack Surface Analysis of BlackBerry DevicesCall Record Monitoring / Bypassing Caller Verification Systems / Telephony Data Theft / Premium Rate Call

Strany 28 - HTTP / WAP

Attack Surface Analysis of BlackBerry Devicesinteraction to succeed. However protection via user judgement cannot be overestimated, as it has beenprov

Strany 29 - HTTP Proxy

Attack Surface Analysis of BlackBerry DevicesAppendix AThe table below illustrates which features of the BlackBerry API require code signing, which ca

Strany 30 - Telephony

Attack Surface Analysis of BlackBerry DevicesReferences1 BlackBerry Java Development Environment Version 4.2.0 Fundamentals Guide, RIM.http://www.blac

Strany 31 - Premium Rate Calls

Attack Surface Analysis of BlackBerry Devices21 Connected Limited Device Configuration 1.1 (CLDC) Specification, Java Community Process.http://jcp.org

Strany 33 - Conclusions

About SymantecSymantec is the global leaderin information security, providinga broad range of software,appliances, and services designedto help indivi

Strany 34

White Paper: Symantec Security ResponseWorm...

Strany 35 - Appendix A

Attack Surface Analysis of BlackBerry DevicesIntroductionThe BlackBerry device and supporting platform are developed by Research In Motion (RIM), a Ca

Strany 36 - References

Attack Surface Analysis of BlackBerry Devicestion may result in behavior different to that outlined in this document.This document touches on the role

Strany 37

Attack Surface Analysis of BlackBerry DevicesBlackBerry using thejavaloader utility, but when the user attempts to execute it, they get an error such

Strany 38

Attack Surface Analysis of BlackBerry DevicesIt's worth mentioning that the signing keys are encrypted on the host by default, and the user must

Strany 39

Attack Surface Analysis of BlackBerry DevicesSource: Manual inspection of the BlackBerry device.9Permission Default Value (BIS) Allowable valuesConnec

Komentáře k této Příručce

Žádné komentáře