A large company intends to use Blackberry for corporate mobile phones and a security analyst is
assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to
demonstrate how an attacker could circumvent perimeter defenses and gain access to
the corporate network. What tool should the analyst use to perform a Blackjacking attack?
A.
Paros Proxy
B.
BBProxy
C.
BBCrack
D.
Blooover
B