Here are some methods that can lead us in the "Attack".
1 . ARP Spoofing
To
be able to capture data through network switches , slah one way to do
this is with a " poison / clicking - inject " the ARP table on the
Blackberry device known as ARP spoofing can also be called the method of
ARP poisoning or ARP poison routing . ARP
table is used Blackberry devices netwok us to communicate with other
devices or kira2 like this explanation [ i ] [ i ] " The principle of
ARP spoofing is to send fake , or " spoofed " , ARP messages to an
Ethernet LAN . Generally
, the aim is to associate the " attacker 's " MAC address with the IP
address of another node ( such as the default gateway ) . Any traffic meant for that IP sent to the attacker instead . The
attacker could the choose to forward the traffic to the actual default
gateway ( passive sniffing ) or modify the the data before forwarding it
( man-in - the-middle - attack) . The
attacker could also launch a denial- of- service attack againts a
victim by associating a nonexistent MAC address to the IP address ofthe
victim 's default gateway .
For
example , when someone tries to connect to one of his Blackberry
wireless access point ( WAP ) to connect to the network , and then using
serangn ARP spoofing techniques to poison the ARP table ( internal )
owned by Blackberry , Blackberry which has so poisoned following the server will send all data to and from a poisoned past Blackberry Blackberry " attacker " first.If the guess is illustrated as follows :
Then the attacker can capture network traffic for further analysis, in addition to the usual attackers also use the program "Whiteshark" to accommodate the data to be in the dump using another app called ssldump (process decrypt SSL traffic), this method is used to transform the data becomes "cleartext" by using false certificates of course, following false certificate (fake certificate).
2. DNS Spoofing:
The second method is done by exploiting the topology (map / mapping) network model "proxying" who used the Blackberry to rcp.ap.blackberry.com. By the way all Blackberry devices that use the network servers regional (Asia Pacific) will assume that the server (WAP = wireless access point) that has been set by the attacker as a regional server BIS "DNS Spoofing is the art of making a DNS to point to an another IP that it would be supposed to point to ".
There are several steps that must be done by the first attacker spoofing DNS entries from the DNS server (using WAP, then the attacker will be entered into the server and add the following entry rcp.ap.blackberry.com which will then be configured by the computer has been previously set to perform "the data capture, editing, and manipulation of data".
After successfully adding rcp.ap.blackberry.com so in other words the whole blackberry is connected to the access point and the DNS will voluntarily enter into the computer the attacker and the attacker would configure the server using SSL blackbery. But if we look deeper then if we do browsing while we are on the blackberry "hack" actually blackberry we will give you a warning like this:
Here the attacker also must use "Stunnel" to connect the computer to the user attcker rcp.ap.blackberry.com blackberry and server is intended for activities in blackberry "hack" still takes place by using the SSL course by using fake certificates that have been made previously. Attacker usually also use Blackbag blackberry users to connect to a real server that has been converted into "plaintext" goes something like this:
And in the end PIN sent plaintext sender and receiver and allows the attacker to obtain information either in the form of e-mail, browsing, chat and also time aktifikas blackberrypun user can be known by the attacker. PIN is "irreversible" lead owner PIN aslidapat easily attacked as "denial of service and abuse" of the attacker or something like this "Blackberry PIN is an eight character hexadecimal identification number assigned to each BlackBerry device. PINS can not be changed and are locked to each handset. Blackberrys can message each other using the PIN directly or by using the BlackBerry Messenger application ".