SlideShare a Scribd company logo
1 of 28
www.studymafia.org
Submitted To: Submitted By:
www.studymafia.org www.studymafia.org
Seminar
On
Bluejacking
 Introduction
 Bluejacking Technology
 Architecture
 Technical Features
 How to Bluejack
 Usage of bluejacking
 Related concepts
 Future aspects
 Conclusion
 Reference
• Bluejacking
– Sending of unsolicited messages over Bluetooth to
Bluetooth-enabled devices such as mobile phones,
PDAs or laptop computers via the OBEX protocol.
• Origin
– Started after a Malaysian IT consultant named
“Ajack” posted a comment on a mobile phone forum.
 Bluetooth technology
 vCard
 OBEX protocol
• Short range wireless LAN
• Connects numerous devices of different functions like telephones,
notebooks, computers, digital cameras etc. , in Personal Area
Network (PAN).
• Three areas - Data and Voice access points, Cable replacement, and
Ad hoc networking.
• Supports point - to - point as well as multi-point.
• Low power
• Low cost single chip radio – feasible
Piconet
• The devices find each other and form a network called “
piconet ” spontaneously.
• A piconet is a basic unit with up to 8 nodes, one of which
is a master and up to seven active slave nodes within a
maximum distance of 10 meters.
• All communication between master and slaves.
• Piconet is a centralized TDM system.
• Master controls clock and decides the time slot for the
device.
• In a piconet , there can be up to 255 parked nodes.
• Master switches to low power state and parked node wait
for beacon from master.
Connection Type
Spread Spectrum (Frequency Hopping)
& Time Division Duplex (1600
hops/sec)
Spectrum
2.4 GHz ISM Open Band (79 MHz of
spectrum = 79 channels)
Modulation Gaussian Frequency Shift Keying
Transmission Power 1 mw – 100 mw
Data Rate 1 Mbps
Range 30 ft
Supported Stations 8 devices
Data Security –Authentication
Key
128 bit key
Data Security –Encryption Key 8-128 bits (configurable)
Module size 9 x 9 mm
 Classification of devices on the basis of Power
dissipated & corresponding maximum Range.
POWER RANGE
CLASS I 20 dBm 100 m
CLASS II 0-4 dBm 10 m
CLASS III 0 dBm 1 m
• Mobile
• Personal computers
• Software tools
– Bluespam
• Searches for all discoverable Bluetooth devices and
sends a file to them (spam's them) if they support
OBEX.
• By default a small text will be send.
 Customize the message that should be send you need
a palm with an SD/MMC card, then you create the
directory /PALM/programs/BlueSpam/ Send/ and put
the file you would like to in into this directory. Activity is
logged to /PALM/programs/BlueSpam/Log/log.txt.
› Mobiluck
› Meeting point
 Is compatible with pocket PC, palm, Windows.
› Proximity mail
› Easyjack
› Freejack
 Freejack is compatible to java phone like Nokia N-
series.
 Busy shopping centre
 Starbucks
 Train Station
 High Street
 On a train/ tube/ bus
 Cinema
 Café/ restaurant/ pub
 Mobile phone shop
 Electronics shop (e.g. Dixons)
0 5 10 15 20 25 30 35
Public transportation
Stores ans shopping malls
Restaurants
Bars
Cafés
Home
Places where bluejack occures
 Advertisement
 Marketing opportunity
› Viral communication
› Community activities
› Location based service
 Do not hack any device
 Don't send abusive messages
 Don't threaten anyone
 Don't put your personal information in a BlueJack message
 Don't reveal yourself to the 'victim'
 Do disable Bluetooth if you don't want to be BlueJacked
 Bluesnarfing
 Bluecasting
 Bluebugging
 Is the unauthorized access of information
from a wireless device through a Bluetooth
connection, often between phones,
desktops, laptops, and PDAs.
 Even if your device is hidden bluesnarfing
can also be done.
 Provision of any small digital media to
suitable media provisioning enabled devices
over Bluetooth via the OBEX protocol.
 Form of Bluetooth attack.
 Allows the user to take control of a victim's
phone to call the user's phone.
 Earlier issue
 Promotes an environment that puts consumer devices
at greater risk.
 Complete memory contents of some mobile phones
can be accessed by a previously trusted paired
device.
 Phonebook and calendar can be obtained without
owners knowledge.
 Present Scenario
 primarily occurs in public spaces
 Security issues previously involved with
bluejacking has been resolved.
 In order for information to be duplicated, the devices
would have to be paired. Bluejacking does not require
a password to be entered and therefore the two
devices are not paired
 Turn off your Bluetooth device until you need
to communicate with another user.
 Buy an E2X bag.
› It blocks all transmissions and receiving signals
from leaving the bag.
 Act as major sale tool
 learn user preferences by placing options
like "more ads like this" and "less ads like
this" in each advertisement.
 Because of its low cost and power
consumption this technology has a great
future ahead.
 www.google.com
 www.wikipedia.com
 www.studymafia.org
Thanks
Seminar on Bluejacking Techniques and Risks

More Related Content

Similar to Seminar on Bluejacking Techniques and Risks

Similar to Seminar on Bluejacking Techniques and Risks (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Blutooth technology
Blutooth technologyBlutooth technology
Blutooth technology
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
bluejacking
bluejackingbluejacking
bluejacking
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia TechnologyBluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia Technology
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
 
R1x g17 bluetooth i
R1x g17 bluetooth iR1x g17 bluetooth i
R1x g17 bluetooth i
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Seminar on Bluejacking Techniques and Risks

  • 1. www.studymafia.org Submitted To: Submitted By: www.studymafia.org www.studymafia.org Seminar On Bluejacking
  • 2.  Introduction  Bluejacking Technology  Architecture  Technical Features  How to Bluejack  Usage of bluejacking  Related concepts  Future aspects  Conclusion  Reference
  • 3. • Bluejacking – Sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers via the OBEX protocol. • Origin – Started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.
  • 4.  Bluetooth technology  vCard  OBEX protocol
  • 5. • Short range wireless LAN • Connects numerous devices of different functions like telephones, notebooks, computers, digital cameras etc. , in Personal Area Network (PAN). • Three areas - Data and Voice access points, Cable replacement, and Ad hoc networking. • Supports point - to - point as well as multi-point. • Low power • Low cost single chip radio – feasible
  • 6. Piconet • The devices find each other and form a network called “ piconet ” spontaneously. • A piconet is a basic unit with up to 8 nodes, one of which is a master and up to seven active slave nodes within a maximum distance of 10 meters. • All communication between master and slaves. • Piconet is a centralized TDM system. • Master controls clock and decides the time slot for the device. • In a piconet , there can be up to 255 parked nodes. • Master switches to low power state and parked node wait for beacon from master.
  • 7.
  • 8. Connection Type Spread Spectrum (Frequency Hopping) & Time Division Duplex (1600 hops/sec) Spectrum 2.4 GHz ISM Open Band (79 MHz of spectrum = 79 channels) Modulation Gaussian Frequency Shift Keying Transmission Power 1 mw – 100 mw Data Rate 1 Mbps Range 30 ft Supported Stations 8 devices Data Security –Authentication Key 128 bit key Data Security –Encryption Key 8-128 bits (configurable) Module size 9 x 9 mm
  • 9.  Classification of devices on the basis of Power dissipated & corresponding maximum Range. POWER RANGE CLASS I 20 dBm 100 m CLASS II 0-4 dBm 10 m CLASS III 0 dBm 1 m
  • 10. • Mobile • Personal computers • Software tools – Bluespam • Searches for all discoverable Bluetooth devices and sends a file to them (spam's them) if they support OBEX. • By default a small text will be send.
  • 11.  Customize the message that should be send you need a palm with an SD/MMC card, then you create the directory /PALM/programs/BlueSpam/ Send/ and put the file you would like to in into this directory. Activity is logged to /PALM/programs/BlueSpam/Log/log.txt. › Mobiluck
  • 12. › Meeting point  Is compatible with pocket PC, palm, Windows. › Proximity mail › Easyjack › Freejack  Freejack is compatible to java phone like Nokia N- series.
  • 13.  Busy shopping centre  Starbucks  Train Station  High Street  On a train/ tube/ bus  Cinema  Café/ restaurant/ pub  Mobile phone shop  Electronics shop (e.g. Dixons)
  • 14. 0 5 10 15 20 25 30 35 Public transportation Stores ans shopping malls Restaurants Bars Cafés Home Places where bluejack occures
  • 15.  Advertisement  Marketing opportunity › Viral communication › Community activities › Location based service
  • 16.  Do not hack any device  Don't send abusive messages  Don't threaten anyone  Don't put your personal information in a BlueJack message  Don't reveal yourself to the 'victim'  Do disable Bluetooth if you don't want to be BlueJacked
  • 18.  Is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs.  Even if your device is hidden bluesnarfing can also be done.
  • 19.  Provision of any small digital media to suitable media provisioning enabled devices over Bluetooth via the OBEX protocol.
  • 20.  Form of Bluetooth attack.  Allows the user to take control of a victim's phone to call the user's phone.
  • 21.  Earlier issue  Promotes an environment that puts consumer devices at greater risk.  Complete memory contents of some mobile phones can be accessed by a previously trusted paired device.  Phonebook and calendar can be obtained without owners knowledge.
  • 22.  Present Scenario  primarily occurs in public spaces  Security issues previously involved with bluejacking has been resolved.  In order for information to be duplicated, the devices would have to be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired
  • 23.  Turn off your Bluetooth device until you need to communicate with another user.  Buy an E2X bag. › It blocks all transmissions and receiving signals from leaving the bag.
  • 24.  Act as major sale tool  learn user preferences by placing options like "more ads like this" and "less ads like this" in each advertisement.
  • 25.  Because of its low cost and power consumption this technology has a great future ahead.