SlideShare a Scribd company logo
Blue Jacking
PRESENTER-
YASHWANTH S
Agenda
What is Bluetooth?
What is Blue jacking?
History
How to Blue jack?
Software tools
Places where blue jacking occurs
Prevention
Warning
Conclusion
What is Bluetooth ?
 Bluetooth is defined as a wireless technology that provides short
range communication.
 Bluetooth consist of very limited range; usually around 10 meters
on mobile phones, but for laptops it can reach up to 100 meters with
powerful transmitters.
 Bluetooth is for synchronizing emails, sending messages, or
connecting to a remote headsets.
What is Blue Jacking ?
 Blue jacking is the sending of unsolicited message over Bluetooth –
enabled devices such as mobile phones, laptops, computers PDA
devices via OBEX protocol
History
 The Bluejack phenomenon started after a Malaysian IT consultant
named “Ajack” posted a comment on a mobile phone forum.
 Ajack told IT web that he used his Ericsson cell phone in a bank to
send message to someone with Nokia 7650.
 He created a new contact and filled in the first name with ‘Buy
Ericsson !’ and sent a business card to the Nokia phone
How to Blue Jack ?
Assuming that you now have a Bluetooth phone in your hands,
the first thing to do is to make sure that Bluetooth is enabled.
Steps are as follows:
 Bluetooth devices only work over short distances, so we need
to find the big crowd.
 we now need to create a new contact in our Phone Book –
rather putting someone's name in the name field we must write
a short note message like – “Hey, you have been Blue jacked !”.
 Press done/Ok option. Save this new contact in the
phone/address book of mobile phone/laptop respectively.
 Then click on the contact created. Go to action choose “via Bluetooth” or “send to
Bluetooth” option.
 Click the “search” option for discovering active Bluetooth devices. Select a device
from those list.
 After the selection of the particular device, the short messae would be transmitted to
it. Thus, the device would be Blue jacked.
Software Tools
 There are some software's to do Blue jacking activities in an easier
way.
 So by downloading that software on our personal computer or on
your Bluetooth configured or enabled mobile phone we can do it
directly by just searching the Bluetooth enabled device and send an
unsolicited message.
 There are many software tools available in the market and the
name is according to their usage. Some of tools are Redfang,
Bluescanner, Bluesnaf and Bluebug.
RedFang
Ollie White house has designed a software tool called RedFang which can
discover Bluetooth enabled devices that have been set to be non discoverable.
Bluesniffer
Bluesniffer is a simple utility for finding discoverable and hidden Bluetooth –
enabled devices. It operated on Linux and it is a graphics tool.
Blue Scanner
Bluescaner searches out for the Bluetooth – enables devices tries to extract as
much information as possible for each newly discovered devices.
Continue..
Continue..
Bluesnarf
 Bluesnarfing is the method of hacking into a
Bluetooth enabled mobile phones.
 With this we can copy its entire information like
contact book, pictures, their data etc.
 This software gives the complete freedom to the
hacker, to send a “corruption code” which will
completely shutdown the phone down and make the
phone unusable.
Continue..
Bluebug
 This simply exploits the Bluebug (It’s the name of some set of Bluetooth
security holes) vulnerability of the Bluetooth enabled devices.
 By exploiting this one can access phone books, calls lists, data and other
information of that devices.
Statistical report on Blue Jacking tools
Places where Blue Jacking occurs
Prevention
 There is hardly any software available to
prevent or detect blue jacking.
 Turn off Bluetooth
 Don’t put devices in discoverable and
connectable mode.
Warning
Never try to ‘hack’ a device for the
purpose of copying or modifying any
files on any devices or upload any
executable files. By hacking a device you
are committing an offence under the
“Computer offence act 1990”, which
states it is an offence to obtain
unauthorized access to any computer.
Conclusion
 Bluetooth is a great technology with so many useful application.
 At the meanwhile, variety of Bluetooth hacking tools and techniques are
available in this world, blue jacking being the most vulnerable, which makes it a
little riskier to use this technology.
 Bluetooth is not going to go away because of a few security flaws; instead it
can be secure if configured properly and used carefully with a proper
understanding.
 So, use this technology properly as it is intended and get best of it, rather
than just making wrong use of it. And users need to be made aware of the
vulnerabilities of there devices so that he can use Bluetooth more effectively,
confidently and safely.
THANK YOU ..
Any Questions..?
devices … !

More Related Content

What's hot

Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
Niki mundra
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Varna Shankar
 
bluejacking
bluejackingbluejacking
bluejacking
fsanakhan
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Prabhat Yadav
 
bluejacking
bluejackingbluejacking
bluejacking
Jyoti Chintadi
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
BLUEJACKING
BLUEJACKINGBLUEJACKING
Bluejacking
BluejackingBluejacking
Bluejacking
dixitas
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejackingAkshita Pillai
 
Bluejacking
BluejackingBluejacking
Bluejacking
Muhammad Adeel
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhanaSadhana28
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
Aryan college
 
Bluejacking
BluejackingBluejacking
Bluejacking
ss30
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
BindhuBhargaviTalasi
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
The Avi Sharma
 
Bluejacking
BluejackingBluejacking
Bluejacking
Komal Singh
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
Shravani Patil
 

What's hot (20)

Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 

Similar to Blue Jacking

blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
22R25A0507PONNALOKES
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
ankit680
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
dima gurov
 
Bluetooth
BluetoothBluetooth
Bluetooth
XadafAttique
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technologypariluv
 
blutooth connection.pptx
blutooth connection.pptxblutooth connection.pptx
blutooth connection.pptx
joker60036
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
shaikhaMohamed
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
shaikhaMohamed
 
Bluetooth
BluetoothBluetooth
Bluetooth
Pranati Das
 
Bluetooth Chat Application.pptx
Bluetooth Chat Application.pptxBluetooth Chat Application.pptx
Bluetooth Chat Application.pptx
ShivaVemula2
 
226335 633858374451812775
226335 633858374451812775226335 633858374451812775
226335 633858374451812775pratikpatilp
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
guest664c3f
 

Similar to Blue Jacking (15)

blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
blutooth connection.pptx
blutooth connection.pptxblutooth connection.pptx
blutooth connection.pptx
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Chat Application.pptx
Bluetooth Chat Application.pptxBluetooth Chat Application.pptx
Bluetooth Chat Application.pptx
 
226335 633858374451812775
226335 633858374451812775226335 633858374451812775
226335 633858374451812775
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

Blue Jacking

  • 2. Agenda What is Bluetooth? What is Blue jacking? History How to Blue jack? Software tools Places where blue jacking occurs Prevention Warning Conclusion
  • 3. What is Bluetooth ?  Bluetooth is defined as a wireless technology that provides short range communication.  Bluetooth consist of very limited range; usually around 10 meters on mobile phones, but for laptops it can reach up to 100 meters with powerful transmitters.  Bluetooth is for synchronizing emails, sending messages, or connecting to a remote headsets.
  • 4. What is Blue Jacking ?  Blue jacking is the sending of unsolicited message over Bluetooth – enabled devices such as mobile phones, laptops, computers PDA devices via OBEX protocol
  • 5. History  The Bluejack phenomenon started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.  Ajack told IT web that he used his Ericsson cell phone in a bank to send message to someone with Nokia 7650.  He created a new contact and filled in the first name with ‘Buy Ericsson !’ and sent a business card to the Nokia phone
  • 6. How to Blue Jack ? Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled. Steps are as follows:  Bluetooth devices only work over short distances, so we need to find the big crowd.  we now need to create a new contact in our Phone Book – rather putting someone's name in the name field we must write a short note message like – “Hey, you have been Blue jacked !”.  Press done/Ok option. Save this new contact in the phone/address book of mobile phone/laptop respectively.
  • 7.  Then click on the contact created. Go to action choose “via Bluetooth” or “send to Bluetooth” option.  Click the “search” option for discovering active Bluetooth devices. Select a device from those list.  After the selection of the particular device, the short messae would be transmitted to it. Thus, the device would be Blue jacked.
  • 8.
  • 9. Software Tools  There are some software's to do Blue jacking activities in an easier way.  So by downloading that software on our personal computer or on your Bluetooth configured or enabled mobile phone we can do it directly by just searching the Bluetooth enabled device and send an unsolicited message.  There are many software tools available in the market and the name is according to their usage. Some of tools are Redfang, Bluescanner, Bluesnaf and Bluebug.
  • 10. RedFang Ollie White house has designed a software tool called RedFang which can discover Bluetooth enabled devices that have been set to be non discoverable. Bluesniffer Bluesniffer is a simple utility for finding discoverable and hidden Bluetooth – enabled devices. It operated on Linux and it is a graphics tool. Blue Scanner Bluescaner searches out for the Bluetooth – enables devices tries to extract as much information as possible for each newly discovered devices. Continue..
  • 11. Continue.. Bluesnarf  Bluesnarfing is the method of hacking into a Bluetooth enabled mobile phones.  With this we can copy its entire information like contact book, pictures, their data etc.  This software gives the complete freedom to the hacker, to send a “corruption code” which will completely shutdown the phone down and make the phone unusable.
  • 12. Continue.. Bluebug  This simply exploits the Bluebug (It’s the name of some set of Bluetooth security holes) vulnerability of the Bluetooth enabled devices.  By exploiting this one can access phone books, calls lists, data and other information of that devices.
  • 13. Statistical report on Blue Jacking tools
  • 14. Places where Blue Jacking occurs
  • 15. Prevention  There is hardly any software available to prevent or detect blue jacking.  Turn off Bluetooth  Don’t put devices in discoverable and connectable mode.
  • 16. Warning Never try to ‘hack’ a device for the purpose of copying or modifying any files on any devices or upload any executable files. By hacking a device you are committing an offence under the “Computer offence act 1990”, which states it is an offence to obtain unauthorized access to any computer.
  • 17. Conclusion  Bluetooth is a great technology with so many useful application.  At the meanwhile, variety of Bluetooth hacking tools and techniques are available in this world, blue jacking being the most vulnerable, which makes it a little riskier to use this technology.  Bluetooth is not going to go away because of a few security flaws; instead it can be secure if configured properly and used carefully with a proper understanding.  So, use this technology properly as it is intended and get best of it, rather than just making wrong use of it. And users need to be made aware of the vulnerabilities of there devices so that he can use Bluetooth more effectively, confidently and safely.
  • 18. THANK YOU .. Any Questions..? devices … !