SlideShare a Scribd company logo
1 of 22
BLUEJACKING
THE AVI SHARMA
CYBER SECURITY Expert
Overvie
w• Bluetooth Technology
• Architecture Of Bluetooth
• What is Blue jacking ?
• How to Blue jack
• Software Tools Used For Blue jack
• Benefits Of Blue jacking
• Negative Aspects of Blue jacking
• Code of ethics
• Related concepts to Blue jacking
• Security issues
• Counter Measures
• Future Aspects
• Conclusion
BLUETOOTH
TECHNOLOGY
• A Bluetooth technology is a high speed low powered
wireless technology link that is designed to connect
phones or other portable equipment together. It is a
specification for the use of low power radio
communications to link phones, computers and other
network devices over short distance without wires.
Architecture
Of Bluetooth
Piconet
• A piconet is a network of devices connected using Bluetooth
technology.
• A piconet is a basic unit with up to 8 nodes, one of which is a master
and up to seven active slave nodes within a maximum distance of 10
meters.
• All communication between master and slaves.
• Piconet gets its name from the word "pico", which means very small.
This very small network is so called because the number is limited to
seven devices
• In a piconet , there can be up to 255 parked nodes.
Architecture
Of Bluetooth
What is
blue jacking ?
• Blue jacking is a hacking method that allows an individual to send
anonymous messages to Bluetooth-enabled devices within a certain
radius.
• Blue jacking is basically the combination of Bluetooth + Hijacking,
as the name comes from.
• Origin
– Started after a Malaysian IT consultant named “Ajack” posted a
comment on a mobile phone forum.
How to Blue jack ?
• Select an area with plenty of multiple users.
• Go to contacts in your address book. Create a new contact.
• Enter the message into the name part like “You have been Blue
jacked !!.Save the new contact.
• Choose "send via Bluetooth". These searches for any bluetooth
device within range.
• Choose one phone and send the contact.You will get the message
"card sent" and then listen for the SMS message tone of your
victim's phone. Look out for the reactions in your victim.
Software tools
used for Blue jack
• Bluespam
• Mobiluck
• Meeting point
~ Is compatible with pocket PC, Windows.
• Proximity mail
• Easyjack
• Freejack
~ Freejack is compatible to java phone like Nokia N-series.
Benefits Of
Bluejacking
• Usually, a blue jacker will best ship a text message, however with
modern-day telephones is possible to send pictures or sound as
properly.
• Humans can send any type of pictures or sounds as properly.
• Any copyright sound files will handiest be dispatched with the
written consent of the copyright holder.
• We can easily transfer files from cellular to computer or from
cellular to cell in a brief duration.
• We can even revel in music by way of wireless headphones via blue
jacking.
NEGATIVE ASPECTS
OF BLUE JACKING
• But with growth in the availability of Bluetooth enable
gadgets, those devices have end up prone to virus attacks and
Complete takeover of devices via a bug software. Those any
even cause irritation in any man or woman as these are just
unwelcomed messages or a few jokes.
• They can annoy absolutely everyone without difficulty.
Usage of
blue jacking
1. Train Station
2. High Street
3. On a train/ tube/ bus
4. Busy shopping centre
5. Cinema
6. Cafe / restaurant / pub
7. Mobile phone shop
8. Electronics shop (e.g. Dixons)
Code of Ethics
1. Do not hack any device
2. Don't send abusive messages
3. Don't threaten anyone
4. Don't put your personal information in a BlueJack message
5. Don't reveal yourself to the 'victim'
6. Do disable Bluetooth if you don't want to be BlueJacked.
Related
concepts
to Bluejacking
• Bluesnarfing
• Bluecasting
• Bluebugging
Bluesnarfing
• Is the unauthorized access of information from a wireless
device through a Bluetooth connection, often
between phones, desktops and laptops.
• Even if your device is hidden bluesnarfing can also
be done.
Bluecasting
• Provision of any small digital media to suitable media
provisioning enabled devices over Bluetooth via the
OBEX protocol.
Bluebugging
• Bluebugging is a hacking technique that allows
individuals to access a device with a discoverable
Bluetooth connection.
• Allows the user to take control of a victim's phone to
call the user's phone.
Security Issues
 Earlier issue -
 Promotes an environment that puts consumer devices at greater
risk.
 Complete memory contents of some mobile phones can be
accessed by a previously trusted paired device.
 Phonebook and calendar can be obtained without owners
knowledge.
Security issues
 Present Scenario -
 Primarily occurs in public spaces
 Security issues previously involved with bluejacking has been
resolved.
 In order for information to be duplicated, the devices would have to be
paired. Bluejacking does not require a password to be entered and
therefore the two devices are not paired
Counter
Measures
• Turn off your Bluetooth device until you need to
communicate with another user.
• Buy an E2X bag.
– It blocks all transmissions and receiving signals
from leaving the bag.
Future Aspects
• Act as major sale tool
• learn user preferences by placing options like "more
ads like this" and "less ads like this" in each
advertisement.
Conclusion
• Bluejacking does not delete or change any data from the device.
Bluejackers often look for reception of the phone user . It can be
said that bluejacking is not at all harmful.
• By it, we can interact with new people. The only thing it can do at
worst is to irritate you or annoy you by sending unsolicited
messages but you can still prevent yourselves from these messages
by changing the visibility of your Bluetooth to invisible or non
discoverable mode.
• It can be helpful as well by providing you with lots of useful
information as well. So, use this technology properly as it is
intended and get best of it, rather than just making wrong use of it
and irritating others.
Thank You
Thank You…

More Related Content

What's hot (20)

Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
Bluetooth Chat Application.pptx
Bluetooth Chat Application.pptxBluetooth Chat Application.pptx
Bluetooth Chat Application.pptx
 
CHATTING APPLICATION.pptx
CHATTING APPLICATION.pptxCHATTING APPLICATION.pptx
CHATTING APPLICATION.pptx
 
Mobile security
Mobile securityMobile security
Mobile security
 
Arduino bluetooth controlled robot
Arduino bluetooth controlled robotArduino bluetooth controlled robot
Arduino bluetooth controlled robot
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Blue Eye Technology
Blue Eye TechnologyBlue Eye Technology
Blue Eye Technology
 
Presentation on modern smart watch
Presentation on modern smart watchPresentation on modern smart watch
Presentation on modern smart watch
 

Similar to BLUEJACKING

Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docxShravani Patil
 
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationExtracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationOpposing Force S.r.l.
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth VulnerabilitiesVictorYee
 
Face Recognition and Door Opening Assistant for Visually Impaired
Face Recognition and Door Opening Assistant for Visually ImpairedFace Recognition and Door Opening Assistant for Visually Impaired
Face Recognition and Door Opening Assistant for Visually ImpairedUllas Puntambekar
 
Fiber internet quick startguide
Fiber internet   quick startguideFiber internet   quick startguide
Fiber internet quick startguideMaxis Fibre
 
Maxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre
 

Similar to BLUEJACKING (20)

Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationExtracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - Presentation
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
Face Recognition and Door Opening Assistant for Visually Impaired
Face Recognition and Door Opening Assistant for Visually ImpairedFace Recognition and Door Opening Assistant for Visually Impaired
Face Recognition and Door Opening Assistant for Visually Impaired
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Fiber internet quick startguide
Fiber internet   quick startguideFiber internet   quick startguide
Fiber internet quick startguide
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Maxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help Guide
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

More from The Avi Sharma

Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security FundamentalsThe Avi Sharma
 
Presentation on - Processors
Presentation on - Processors Presentation on - Processors
Presentation on - Processors The Avi Sharma
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 

More from The Avi Sharma (6)

Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security Fundamentals
 
Presentation on - Processors
Presentation on - Processors Presentation on - Processors
Presentation on - Processors
 
Robotics
RoboticsRobotics
Robotics
 
Sql injection
Sql injectionSql injection
Sql injection
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

BLUEJACKING

  • 2. Overvie w• Bluetooth Technology • Architecture Of Bluetooth • What is Blue jacking ? • How to Blue jack • Software Tools Used For Blue jack • Benefits Of Blue jacking • Negative Aspects of Blue jacking • Code of ethics • Related concepts to Blue jacking • Security issues • Counter Measures • Future Aspects • Conclusion
  • 3. BLUETOOTH TECHNOLOGY • A Bluetooth technology is a high speed low powered wireless technology link that is designed to connect phones or other portable equipment together. It is a specification for the use of low power radio communications to link phones, computers and other network devices over short distance without wires.
  • 4. Architecture Of Bluetooth Piconet • A piconet is a network of devices connected using Bluetooth technology. • A piconet is a basic unit with up to 8 nodes, one of which is a master and up to seven active slave nodes within a maximum distance of 10 meters. • All communication between master and slaves. • Piconet gets its name from the word "pico", which means very small. This very small network is so called because the number is limited to seven devices • In a piconet , there can be up to 255 parked nodes.
  • 6. What is blue jacking ? • Blue jacking is a hacking method that allows an individual to send anonymous messages to Bluetooth-enabled devices within a certain radius. • Blue jacking is basically the combination of Bluetooth + Hijacking, as the name comes from. • Origin – Started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.
  • 7. How to Blue jack ? • Select an area with plenty of multiple users. • Go to contacts in your address book. Create a new contact. • Enter the message into the name part like “You have been Blue jacked !!.Save the new contact. • Choose "send via Bluetooth". These searches for any bluetooth device within range. • Choose one phone and send the contact.You will get the message "card sent" and then listen for the SMS message tone of your victim's phone. Look out for the reactions in your victim.
  • 8. Software tools used for Blue jack • Bluespam • Mobiluck • Meeting point ~ Is compatible with pocket PC, Windows. • Proximity mail • Easyjack • Freejack ~ Freejack is compatible to java phone like Nokia N-series.
  • 9. Benefits Of Bluejacking • Usually, a blue jacker will best ship a text message, however with modern-day telephones is possible to send pictures or sound as properly. • Humans can send any type of pictures or sounds as properly. • Any copyright sound files will handiest be dispatched with the written consent of the copyright holder. • We can easily transfer files from cellular to computer or from cellular to cell in a brief duration. • We can even revel in music by way of wireless headphones via blue jacking.
  • 10. NEGATIVE ASPECTS OF BLUE JACKING • But with growth in the availability of Bluetooth enable gadgets, those devices have end up prone to virus attacks and Complete takeover of devices via a bug software. Those any even cause irritation in any man or woman as these are just unwelcomed messages or a few jokes. • They can annoy absolutely everyone without difficulty.
  • 11. Usage of blue jacking 1. Train Station 2. High Street 3. On a train/ tube/ bus 4. Busy shopping centre 5. Cinema 6. Cafe / restaurant / pub 7. Mobile phone shop 8. Electronics shop (e.g. Dixons)
  • 12. Code of Ethics 1. Do not hack any device 2. Don't send abusive messages 3. Don't threaten anyone 4. Don't put your personal information in a BlueJack message 5. Don't reveal yourself to the 'victim' 6. Do disable Bluetooth if you don't want to be BlueJacked.
  • 14. Bluesnarfing • Is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops and laptops. • Even if your device is hidden bluesnarfing can also be done.
  • 15. Bluecasting • Provision of any small digital media to suitable media provisioning enabled devices over Bluetooth via the OBEX protocol.
  • 16. Bluebugging • Bluebugging is a hacking technique that allows individuals to access a device with a discoverable Bluetooth connection. • Allows the user to take control of a victim's phone to call the user's phone.
  • 17. Security Issues  Earlier issue -  Promotes an environment that puts consumer devices at greater risk.  Complete memory contents of some mobile phones can be accessed by a previously trusted paired device.  Phonebook and calendar can be obtained without owners knowledge.
  • 18. Security issues  Present Scenario -  Primarily occurs in public spaces  Security issues previously involved with bluejacking has been resolved.  In order for information to be duplicated, the devices would have to be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired
  • 19. Counter Measures • Turn off your Bluetooth device until you need to communicate with another user. • Buy an E2X bag. – It blocks all transmissions and receiving signals from leaving the bag.
  • 20. Future Aspects • Act as major sale tool • learn user preferences by placing options like "more ads like this" and "less ads like this" in each advertisement.
  • 21. Conclusion • Bluejacking does not delete or change any data from the device. Bluejackers often look for reception of the phone user . It can be said that bluejacking is not at all harmful. • By it, we can interact with new people. The only thing it can do at worst is to irritate you or annoy you by sending unsolicited messages but you can still prevent yourselves from these messages by changing the visibility of your Bluetooth to invisible or non discoverable mode. • It can be helpful as well by providing you with lots of useful information as well. So, use this technology properly as it is intended and get best of it, rather than just making wrong use of it and irritating others.