The analyst needs to assess potential threats to Blackberry phones for a third-party company. To do this, he plans to use the Blackjacking attack method to demonstrate how an attacker might bypass perimeter defenses and gain access to the corporate network. Which tool is best suited for the analyst for this task?