Presentation on Blue Jacking.
~ By The Avi Sharma
Presentation Download Link - https://www.slideshare.net/AvinashSha...
Follow us -
Youtube - https://www.youtube.com/watch?v=aVHWA23YB90
Instagram - https://instagram.com/the_avi_sharma_
Telegram - https://t.me/theavisharma
WhatsApp - https://chat.whatsapp.com/LcRzPABUGdZ5otH4mG6zIP
2. Overvie
w• Bluetooth Technology
• Architecture Of Bluetooth
• What is Blue jacking ?
• How to Blue jack
• Software Tools Used For Blue jack
• Benefits Of Blue jacking
• Negative Aspects of Blue jacking
• Code of ethics
• Related concepts to Blue jacking
• Security issues
• Counter Measures
• Future Aspects
• Conclusion
3. BLUETOOTH
TECHNOLOGY
• A Bluetooth technology is a high speed low powered
wireless technology link that is designed to connect
phones or other portable equipment together. It is a
specification for the use of low power radio
communications to link phones, computers and other
network devices over short distance without wires.
4. Architecture
Of Bluetooth
Piconet
• A piconet is a network of devices connected using Bluetooth
technology.
• A piconet is a basic unit with up to 8 nodes, one of which is a master
and up to seven active slave nodes within a maximum distance of 10
meters.
• All communication between master and slaves.
• Piconet gets its name from the word "pico", which means very small.
This very small network is so called because the number is limited to
seven devices
• In a piconet , there can be up to 255 parked nodes.
6. What is
blue jacking ?
• Blue jacking is a hacking method that allows an individual to send
anonymous messages to Bluetooth-enabled devices within a certain
radius.
• Blue jacking is basically the combination of Bluetooth + Hijacking,
as the name comes from.
• Origin
– Started after a Malaysian IT consultant named “Ajack” posted a
comment on a mobile phone forum.
7. How to Blue jack ?
• Select an area with plenty of multiple users.
• Go to contacts in your address book. Create a new contact.
• Enter the message into the name part like “You have been Blue
jacked !!.Save the new contact.
• Choose "send via Bluetooth". These searches for any bluetooth
device within range.
• Choose one phone and send the contact.You will get the message
"card sent" and then listen for the SMS message tone of your
victim's phone. Look out for the reactions in your victim.
8. Software tools
used for Blue jack
• Bluespam
• Mobiluck
• Meeting point
~ Is compatible with pocket PC, Windows.
• Proximity mail
• Easyjack
• Freejack
~ Freejack is compatible to java phone like Nokia N-series.
9. Benefits Of
Bluejacking
• Usually, a blue jacker will best ship a text message, however with
modern-day telephones is possible to send pictures or sound as
properly.
• Humans can send any type of pictures or sounds as properly.
• Any copyright sound files will handiest be dispatched with the
written consent of the copyright holder.
• We can easily transfer files from cellular to computer or from
cellular to cell in a brief duration.
• We can even revel in music by way of wireless headphones via blue
jacking.
10. NEGATIVE ASPECTS
OF BLUE JACKING
• But with growth in the availability of Bluetooth enable
gadgets, those devices have end up prone to virus attacks and
Complete takeover of devices via a bug software. Those any
even cause irritation in any man or woman as these are just
unwelcomed messages or a few jokes.
• They can annoy absolutely everyone without difficulty.
11. Usage of
blue jacking
1. Train Station
2. High Street
3. On a train/ tube/ bus
4. Busy shopping centre
5. Cinema
6. Cafe / restaurant / pub
7. Mobile phone shop
8. Electronics shop (e.g. Dixons)
12. Code of Ethics
1. Do not hack any device
2. Don't send abusive messages
3. Don't threaten anyone
4. Don't put your personal information in a BlueJack message
5. Don't reveal yourself to the 'victim'
6. Do disable Bluetooth if you don't want to be BlueJacked.
14. Bluesnarfing
• Is the unauthorized access of information from a wireless
device through a Bluetooth connection, often
between phones, desktops and laptops.
• Even if your device is hidden bluesnarfing can also
be done.
15. Bluecasting
• Provision of any small digital media to suitable media
provisioning enabled devices over Bluetooth via the
OBEX protocol.
16. Bluebugging
• Bluebugging is a hacking technique that allows
individuals to access a device with a discoverable
Bluetooth connection.
• Allows the user to take control of a victim's phone to
call the user's phone.
17. Security Issues
Earlier issue -
Promotes an environment that puts consumer devices at greater
risk.
Complete memory contents of some mobile phones can be
accessed by a previously trusted paired device.
Phonebook and calendar can be obtained without owners
knowledge.
18. Security issues
Present Scenario -
Primarily occurs in public spaces
Security issues previously involved with bluejacking has been
resolved.
In order for information to be duplicated, the devices would have to be
paired. Bluejacking does not require a password to be entered and
therefore the two devices are not paired
19. Counter
Measures
• Turn off your Bluetooth device until you need to
communicate with another user.
• Buy an E2X bag.
– It blocks all transmissions and receiving signals
from leaving the bag.
20. Future Aspects
• Act as major sale tool
• learn user preferences by placing options like "more
ads like this" and "less ads like this" in each
advertisement.
21. Conclusion
• Bluejacking does not delete or change any data from the device.
Bluejackers often look for reception of the phone user . It can be
said that bluejacking is not at all harmful.
• By it, we can interact with new people. The only thing it can do at
worst is to irritate you or annoy you by sending unsolicited
messages but you can still prevent yourselves from these messages
by changing the visibility of your Bluetooth to invisible or non
discoverable mode.
• It can be helpful as well by providing you with lots of useful
information as well. So, use this technology properly as it is
intended and get best of it, rather than just making wrong use of it
and irritating others.