SlideShare a Scribd company logo
Vi hang shah
Blue Jacking
Introduction
Blue Jacking is technique of sending text message between devices that connected with
Bluetooth. Blue jacking also allow sending multimedia content from one device to another
devices. The range of sending content within 10 meters and there is no charge of it because
it is connected with Bluetooth and its free.
Blue jacking sounds like hijacking means Bluetooth hijacking, but a bluejacker never hijacks
anything. Both parties remain in absolute control over their devices, and a bluejacker will
not be able to take over your phone or steal your personal information.
How to blue jack?
1. Go to address book and create a new contact.
2. When creating the contact, enter the message you wish to blue jack into the
contact name part.
3. Save the contact.
4. Long press on contact and choose via send card Bluetooth.
5. Search for Bluetooth device within your range.
6. Select the device which you want to connect.
7. And send the contact to that device via Bluetooth
8. You will get the message “card sent” and then listen for the sms message
tone of your victim’s phone.
How to prevent form blue jacking?
1. Setting the Bluetooth on the right mode
Adjust the setting of Bluetooth to non-discoverable mode. The non-
discoverable mode hides the device from attackers or unknown people
Vi hang shah
2. Factory reset of the phone
If your device was perpetrated at some point, it means that attacker’s device
has been already been added as a trusted device on your phone.
3. Keep away from strangers
Make it decline any message or connection request from unknown device.
Most attack happen due to accepting connection request from stranger who
then gets added as trusted devices.
4. Putting of the Bluetooth when it has no use
If you don’t use the Bluetooth frequently, keep it off to avoid your device
from being listed in the sender’s device search list.
5. Set password for Bluetooth
Software Tools for blue jacking
Blue spam
Meeting point
Freejack
Easyjacking

More Related Content

What's hot

Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
Rahul Raj
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Varna Shankar
 
bluejacking
bluejackingbluejacking
bluejacking
Jyoti Chintadi
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Prabhat Yadav
 
bluejacking
bluejackingbluejacking
bluejacking
fsanakhan
 
Bluejacking
BluejackingBluejacking
Bluejacking
DHARANI .G
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
Akshita Pillai
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
Binghamton University
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking
BluejackingBluejacking
Bluejacking
fsanakhan
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
Bluejacking
BluejackingBluejacking
Bluejacking
Daud Sayyed
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
Sadhana28
 
Bluejacking
BluejackingBluejacking
Bluejacking
Muhammad Adeel
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
Aryan college
 
Bluejacking
BluejackingBluejacking
Bluejacking
ss30
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
BindhuBhargaviTalasi
 
How to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhoneHow to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhone
Howtonia
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
Shravani Patil
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhone
Howtonia
 

What's hot (20)

Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
How to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhoneHow to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhone
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhone
 

Viewers also liked

Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]
Mayank Tripathi
 
easy to way swallow wireless telemetry
easy to way swallow wireless telemetryeasy to way swallow wireless telemetry
easy to way swallow wireless telemetry
mohammed shahid
 
Light fidelity(Li Fi)
Light fidelity(Li Fi)Light fidelity(Li Fi)
Light fidelity(Li Fi)
Sumedh Saraf
 
Documentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software DevelopmentDocumentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software Development
Fabian Kiss
 
Li fi doc
Li fi docLi fi doc
Li fi doc
Arun Mishra
 
Presentation on Femtocell technology
Presentation on Femtocell technologyPresentation on Femtocell technology
Presentation on Femtocell technology
vijay rastogi
 
Nokia morph technology
Nokia morph technologyNokia morph technology
Nokia morph technology
Kummari Sanjay
 
6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry
rrrattlingrajeev
 
Smartquill
SmartquillSmartquill
Smartquill
Srikanth Merupu
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
Rohith Palakurthi
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
Rohit Gupta
 
Light Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar ReportLight Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar Report
Shamil Niju
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
Student
 
FemtoCell
FemtoCellFemtoCell
FemtoCell
Vinod Kumar
 
Nokia morph
Nokia morphNokia morph
Nokia morph
Kannan G Vijai
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
Rajendra Dangwal
 
Smartquill
SmartquillSmartquill
Smartquill
Arpit Patel
 
biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
Himanshu Singh
 

Viewers also liked (20)

Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]
 
easy to way swallow wireless telemetry
easy to way swallow wireless telemetryeasy to way swallow wireless telemetry
easy to way swallow wireless telemetry
 
Light fidelity(Li Fi)
Light fidelity(Li Fi)Light fidelity(Li Fi)
Light fidelity(Li Fi)
 
Documentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software DevelopmentDocumentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software Development
 
Li fi doc
Li fi docLi fi doc
Li fi doc
 
Presentation on Femtocell technology
Presentation on Femtocell technologyPresentation on Femtocell technology
Presentation on Femtocell technology
 
Nokia morph technology
Nokia morph technologyNokia morph technology
Nokia morph technology
 
6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry
 
Smartquill
SmartquillSmartquill
Smartquill
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
 
Light Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar ReportLight Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar Report
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
 
FemtoCell
FemtoCellFemtoCell
FemtoCell
 
Nokia morph
Nokia morphNokia morph
Nokia morph
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
Smartquill
SmartquillSmartquill
Smartquill
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
 

Similar to Blue Jacking

Bluejacking
BluejackingBluejacking
Bluejacking
Komal Singh
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
Adam Varn
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
The Avi Sharma
 
Le security v0.8
Le security v0.8Le security v0.8
Le security v0.8
Ravikiran HV
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
shanofa sanu
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
Guneet Pahwa
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
smilichitti
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
McAlester Army Ammunition Plant
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdf
Sherozkhan15
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
Er aditya kumar jha
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
22R25A0507PONNALOKES
 
Securitytips
SecuritytipsSecuritytips
Securitytips
Santosh Khadsare
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
div2345
 
Bluetooth
BluetoothBluetooth
Bluetooth
XadafAttique
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
anupriti
 

Similar to Blue Jacking (17)

Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Le security v0.8
Le security v0.8Le security v0.8
Le security v0.8
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Blue Jacking

  • 1. Vi hang shah Blue Jacking Introduction Blue Jacking is technique of sending text message between devices that connected with Bluetooth. Blue jacking also allow sending multimedia content from one device to another devices. The range of sending content within 10 meters and there is no charge of it because it is connected with Bluetooth and its free. Blue jacking sounds like hijacking means Bluetooth hijacking, but a bluejacker never hijacks anything. Both parties remain in absolute control over their devices, and a bluejacker will not be able to take over your phone or steal your personal information. How to blue jack? 1. Go to address book and create a new contact. 2. When creating the contact, enter the message you wish to blue jack into the contact name part. 3. Save the contact. 4. Long press on contact and choose via send card Bluetooth. 5. Search for Bluetooth device within your range. 6. Select the device which you want to connect. 7. And send the contact to that device via Bluetooth 8. You will get the message “card sent” and then listen for the sms message tone of your victim’s phone. How to prevent form blue jacking? 1. Setting the Bluetooth on the right mode Adjust the setting of Bluetooth to non-discoverable mode. The non- discoverable mode hides the device from attackers or unknown people
  • 2. Vi hang shah 2. Factory reset of the phone If your device was perpetrated at some point, it means that attacker’s device has been already been added as a trusted device on your phone. 3. Keep away from strangers Make it decline any message or connection request from unknown device. Most attack happen due to accepting connection request from stranger who then gets added as trusted devices. 4. Putting of the Bluetooth when it has no use If you don’t use the Bluetooth frequently, keep it off to avoid your device from being listed in the sender’s device search list. 5. Set password for Bluetooth Software Tools for blue jacking Blue spam Meeting point Freejack Easyjacking