Blue jacking mercy

3,232 views

Published on

This is useful to know about the basics of Blue jacking.

Published in: Education
2 Comments
12 Likes
Statistics
Notes
No Downloads
Views
Total views
3,232
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
518
Comments
2
Likes
12
Embeds 0
No embeds

No notes for slide

Blue jacking mercy

  1. 1. Presented By A. Mercy S. Asvitha (II B.Sc.[CS])
  2. 2. Introduction
  3. 3.  “Ajack” posted a comment on a mobile phone forum.  Ajack told IT Web that he used his Ericsson cell phone in a bank to send a message to someone with a Nokia 7650.  Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650, he created a new contact and filled in the first name with ‘Buy Ericsson! and sent a business card to the Nokia phone.
  4. 4. To make sure that Bluetooth is enabled. To read the handbook of the particular phone (or PDA etc). Phone or PDA will start to search the airwaves for other devices within range. To see a list of them appear, or it will say that it cannot find any.
  5. 5. First press the 5way joystick down Then choose "New contact" Then press done Then choose options Then in the first line choose your desired message Then go to the contact Then press options Then choose "Via Bluetooth" Then select & send your message Then scroll down to send Then the phone will search for enabled Devices.
  6. 6. software tools Blue spam: Blue spam: Searches for all discoverable Bluetooth devices. Searches for all discoverable Bluetooth devices. Sends aafile to them if they support OBEX. Sends file to them if they support OBEX. Meeting point: Meeting point: Perfect tool to search for bluetooth devices. Perfect tool to search for bluetooth devices. This software is compatible with pocket pc, windows. This software is compatible with pocket pc, windows. Free jack: Free jack: Compatible to java phone like Nokia N-series. Compatible to java phone like Nokia N-series. Easy jacking (eJack): Easy jacking (eJack): devices. devices. Allows sending of text Messages to other Bluetooth enabled Allows sending of text Messages to other Bluetooth enabled
  7. 7. Usage Of Bluejacking         SY BU ING P OP E R SH N T CE Busy shopping centre Railway Station Café/ restaurant/ pub On a train/ tube/ bus High Street Cinema Mobile phone shop Electronics shop y lw a Rai tion Sta / afé nt/ C ura st a b re pu / rain at On e / b u s tub Hi re h St g et
  8. 8. Architecture Piconet: • The devices find each other and form a network called “ piconet ” spontaneously. • A piconet is a basic unit with up to 8 nodes. • All communication are between master and slaves. • Master controls clock and decides the time slot for the device. • In a piconet , there can be up to 255 parked nodes. (i) Bluejacker - who carry out the bluejack. (ii) Victim – Who receive the bluejack.
  9. 9. Code of Ethics  Don't send abusive messages.  Don't threaten anyone.  Don't put your personal information in a Blue Jack message.  Don't reveal yourself to the 'victim'.  Do disable Bluetooth if you don't want to be Blue Jacked.
  10. 10. Related Concepts Related Concepts Bluesnarfing:  The theft of information form a wireless device through a Bluetooth connection.  This allows access to a calendar, contact list, emails and text messages.  Bluesnarfing is much more serious in relation to ‘Blue jacking’. Bluecasting:  Provision of any small digital media to suitable media provisioning devices over Bluetooth via the OBEX protocol. Bluebugging:   Blue bugging is a form of Bluetooth attack. Allows the user to take control of a victim’s phone to call the user’s phone enabled
  11. 11. Earlier issue: Promotes an environment that puts consumer devices at greater risk.  Complete memory contents of some mobile phones can be accessed by a previously trusted paired device.  Phonebook and calendar can be obtained without owner’s knowledge.  Present Scenario: Primarily occurs in public spaces.  Security issues previously involved with blue jacking has been resolved.  In order for information to be duplicated, the devices would have to be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired. 
  12. 12. Control Measures:  Turn off your Bluetooth device when not in use. Warning:  Never try to ‘hack’ a device.  Is an offence under the “computer misuse act 1990”.
  13. 13. Conclusion  Blue jacking is a technique by which we can interact with new people.  It has ability to bring a revolution market by sending advertisement.
  14. 14. Queries?

×