SlideShare a Scribd company logo
Presented By
A. Mercy
S. Asvitha
(II B.Sc.[CS])
Introduction
 “Ajack” posted a comment on a mobile phone
forum.
 Ajack told IT Web that he used his Ericsson
cell phone in a bank to send a message to
someone with a Nokia 7650.
 Ajack did a Bluetooth discovery to see if there
was another Bluetooth device around.
Discovering a Nokia 7650, he created a new
contact and filled in the first name with ‘Buy
Ericsson! and sent a business card to the Nokia
phone.
To make sure that Bluetooth is enabled.
To read the handbook of the particular phone (or
PDA etc).
Phone or PDA will start to search the airwaves
for other devices within range.
To see a list of them appear, or it will say that it
cannot find any.
First press the 5way joystick down
Then choose "New
contact"
Then press done

Then choose options
Then in the first
line choose your
desired message
Then go to the contact

Then press options

Then choose "Via
Bluetooth"
Then select & send
your message

Then scroll down to
send
Then the phone will
search for enabled
Devices.
software tools
Blue spam:
Blue spam:
Searches for all discoverable Bluetooth devices.
Searches for all discoverable Bluetooth devices.
Sends aafile to them if they support OBEX.
Sends file to them if they support OBEX.

Meeting point:
Meeting point:
Perfect tool to search for bluetooth devices.
Perfect tool to search for bluetooth devices.
This software is compatible with pocket pc, windows.
This software is compatible with pocket pc, windows.

Free jack:
Free jack:
Compatible to java phone like Nokia N-series.
Compatible to java phone like Nokia N-series.

Easy jacking (eJack):
Easy jacking (eJack):
devices.
devices.

Allows sending of text Messages to other Bluetooth enabled
Allows sending of text Messages to other Bluetooth enabled
Usage Of Bluejacking









SY
BU ING
P
OP E R
SH N T
CE

Busy shopping centre
Railway Station
Café/ restaurant/ pub
On a train/ tube/ bus
High Street
Cinema
Mobile phone shop
Electronics shop

y
lw a
Rai tion
Sta

/
afé nt/
C
ura
st a b
re pu

/
rain
at
On e / b u s
tub

Hi

re
h St
g

et
Architecture
Piconet:

• The devices find each other and form a network called
“ piconet ” spontaneously.

• A piconet is a basic unit with up to 8 nodes.
• All communication are between master and slaves.
• Master controls clock and decides the time slot for the
device.

• In a piconet , there can be up to 255 parked nodes.
(i) Bluejacker - who carry out the bluejack.
(ii) Victim – Who receive the bluejack.
Code of Ethics

 Don't send abusive messages.
 Don't threaten anyone.
 Don't put your personal information in a Blue Jack message.
 Don't reveal yourself to the 'victim'.
 Do disable Bluetooth if you don't want to be Blue Jacked.
Related Concepts
Related Concepts

Bluesnarfing:


The theft of information form a wireless device through a Bluetooth
connection.

This allows access to a calendar, contact list, emails and text
messages.

Bluesnarfing is much more serious in relation to ‘Blue jacking’.

Bluecasting:


Provision of any small digital media to suitable media provisioning
devices over Bluetooth via the OBEX protocol.

Bluebugging:




Blue bugging is a form of Bluetooth attack.
Allows the user to take control of a victim’s
phone to call the user’s phone

enabled
Earlier issue:
Promotes an environment that puts consumer devices at greater risk.

Complete memory contents of some mobile phones can be accessed
by a previously trusted paired device.

Phonebook and calendar can be obtained without owner’s
knowledge.


Present Scenario:
Primarily occurs in public spaces.

Security issues previously involved with blue jacking has been
resolved.

In order for information to be duplicated, the devices would have to
be paired. Bluejacking does not require a password to be entered
and therefore the two devices are not paired.

Control Measures:
 Turn off your Bluetooth device when not in use.

Warning:

 Never try to ‘hack’ a device.
 Is an offence under the “computer misuse act
1990”.
Conclusion

 Blue jacking is a technique by which
we can interact with new people.
 It has ability to bring a revolution
market by sending advertisement.
Queries?

More Related Content

What's hot

Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
Rahul Raj
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Prabhat Yadav
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Varna Shankar
 
Bluejacking
BluejackingBluejacking
Bluejacking
dixitas
 
bluejacking
bluejackingbluejacking
bluejacking
fsanakhan
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejackingAkshita Pillai
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
BLUEJACKING
BLUEJACKINGBLUEJACKING
Bluejacking
BluejackingBluejacking
Bluejacking
fsanakhan
 
Bluejacking
BluejackingBluejacking
Bluejacking
Muhammad Adeel
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhanaSadhana28
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
Aryan college
 
Bluejacking
BluejackingBluejacking
Bluejacking
ss30
 
How to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhoneHow to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhone
Howtonia
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
Shravani Patil
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhone
Howtonia
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 

What's hot (20)

Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
How to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhoneHow to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhone
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhone
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 

Viewers also liked

artificial eye
artificial eyeartificial eye
artificial eye
Rajeshwari Raji
 
Presentation on Paper battery
Presentation on Paper battery Presentation on Paper battery
Presentation on Paper battery
manish katara
 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project pptLishita Shah
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
atinav242
 
The Physical Interface
The Physical InterfaceThe Physical Interface
The Physical Interface
Josh Clark
 
wireless power transmission(SPS)
wireless power transmission(SPS)wireless power transmission(SPS)
wireless power transmission(SPS)
Er. Rahul kumar
 
new punit wireless
new punit wirelessnew punit wireless
new punit wirelessPunit Jangir
 
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSIONLASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
Madhusudan Sharma
 
Smart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + SocialSmart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + Social
Romin Irani
 
Exterminator: Automatically Correcting Memory Errors with High Probability
Exterminator: Automatically Correcting Memory Errors with High ProbabilityExterminator: Automatically Correcting Memory Errors with High Probability
Exterminator: Automatically Correcting Memory Errors with High Probability
Emery Berger
 
Global Pico Projector Market Forecast & Opportunities, 2019
Global Pico Projector Market Forecast & Opportunities, 2019Global Pico Projector Market Forecast & Opportunities, 2019
Global Pico Projector Market Forecast & Opportunities, 2019
TechSci Research
 
Intra Oral Camera Camrex 192
Intra Oral Camera Camrex 192 Intra Oral Camera Camrex 192
Intra Oral Camera Camrex 192
Chromadnet
 
Wireless HDMI: a quick-and-dirty guide
Wireless HDMI: a quick-and-dirty guideWireless HDMI: a quick-and-dirty guide
Wireless HDMI: a quick-and-dirty guide
Airtame
 
WIRELESS POWER TRANSMISSION
WIRELESS POWER TRANSMISSIONWIRELESS POWER TRANSMISSION
WIRELESS POWER TRANSMISSIONDevesh Bhatnagar
 
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Atlassian
 
Seguridad Informatica: Pishing
Seguridad Informatica: PishingSeguridad Informatica: Pishing
Seguridad Informatica: Pishing
melanie hernandez
 

Viewers also liked (20)

Paper battery
Paper batteryPaper battery
Paper battery
 
artificial eye
artificial eyeartificial eye
artificial eye
 
Presentation on Paper battery
Presentation on Paper battery Presentation on Paper battery
Presentation on Paper battery
 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project ppt
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 
The Physical Interface
The Physical InterfaceThe Physical Interface
The Physical Interface
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
wireless power transmission(SPS)
wireless power transmission(SPS)wireless power transmission(SPS)
wireless power transmission(SPS)
 
The New Gsm based Neos
The New Gsm based NeosThe New Gsm based Neos
The New Gsm based Neos
 
new punit wireless
new punit wirelessnew punit wireless
new punit wireless
 
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSIONLASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
 
Smart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + SocialSmart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + Social
 
Exterminator: Automatically Correcting Memory Errors with High Probability
Exterminator: Automatically Correcting Memory Errors with High ProbabilityExterminator: Automatically Correcting Memory Errors with High Probability
Exterminator: Automatically Correcting Memory Errors with High Probability
 
Global Pico Projector Market Forecast & Opportunities, 2019
Global Pico Projector Market Forecast & Opportunities, 2019Global Pico Projector Market Forecast & Opportunities, 2019
Global Pico Projector Market Forecast & Opportunities, 2019
 
Intra Oral Camera Camrex 192
Intra Oral Camera Camrex 192 Intra Oral Camera Camrex 192
Intra Oral Camera Camrex 192
 
Wireless HDMI: a quick-and-dirty guide
Wireless HDMI: a quick-and-dirty guideWireless HDMI: a quick-and-dirty guide
Wireless HDMI: a quick-and-dirty guide
 
WIRELESS POWER TRANSMISSION
WIRELESS POWER TRANSMISSIONWIRELESS POWER TRANSMISSION
WIRELESS POWER TRANSMISSION
 
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
 
Seguridad Informatica: Pishing
Seguridad Informatica: PishingSeguridad Informatica: Pishing
Seguridad Informatica: Pishing
 

Similar to Blue jacking mercy

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
BindhuBhargaviTalasi
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
DevMishra450797
 
Bluetooth
BluetoothBluetooth
Bluetooth
Rohith Raj
 
Bluetooth
BluetoothBluetooth
Bluetooth
XadafAttique
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
The Avi Sharma
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
dima gurov
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
22R25A0507PONNALOKES
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
ankit680
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technologypariluv
 
Bluetooth
BluetoothBluetooth
Bluetooth
Aniruddha Gupta
 
Communication devices
Communication devicesCommunication devices
Communication devices
haider ali
 

Similar to Blue jacking mercy (17)

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Blutooth technology
Blutooth technologyBlutooth technology
Blutooth technology
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Communication devices
Communication devicesCommunication devices
Communication devices
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

Blue jacking mercy

  • 1. Presented By A. Mercy S. Asvitha (II B.Sc.[CS])
  • 3.  “Ajack” posted a comment on a mobile phone forum.  Ajack told IT Web that he used his Ericsson cell phone in a bank to send a message to someone with a Nokia 7650.  Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650, he created a new contact and filled in the first name with ‘Buy Ericsson! and sent a business card to the Nokia phone.
  • 4. To make sure that Bluetooth is enabled. To read the handbook of the particular phone (or PDA etc). Phone or PDA will start to search the airwaves for other devices within range. To see a list of them appear, or it will say that it cannot find any.
  • 5. First press the 5way joystick down Then choose "New contact" Then press done Then choose options Then in the first line choose your desired message Then go to the contact Then press options Then choose "Via Bluetooth" Then select & send your message Then scroll down to send Then the phone will search for enabled Devices.
  • 6. software tools Blue spam: Blue spam: Searches for all discoverable Bluetooth devices. Searches for all discoverable Bluetooth devices. Sends aafile to them if they support OBEX. Sends file to them if they support OBEX. Meeting point: Meeting point: Perfect tool to search for bluetooth devices. Perfect tool to search for bluetooth devices. This software is compatible with pocket pc, windows. This software is compatible with pocket pc, windows. Free jack: Free jack: Compatible to java phone like Nokia N-series. Compatible to java phone like Nokia N-series. Easy jacking (eJack): Easy jacking (eJack): devices. devices. Allows sending of text Messages to other Bluetooth enabled Allows sending of text Messages to other Bluetooth enabled
  • 7. Usage Of Bluejacking         SY BU ING P OP E R SH N T CE Busy shopping centre Railway Station Café/ restaurant/ pub On a train/ tube/ bus High Street Cinema Mobile phone shop Electronics shop y lw a Rai tion Sta / afé nt/ C ura st a b re pu / rain at On e / b u s tub Hi re h St g et
  • 8. Architecture Piconet: • The devices find each other and form a network called “ piconet ” spontaneously. • A piconet is a basic unit with up to 8 nodes. • All communication are between master and slaves. • Master controls clock and decides the time slot for the device. • In a piconet , there can be up to 255 parked nodes. (i) Bluejacker - who carry out the bluejack. (ii) Victim – Who receive the bluejack.
  • 9. Code of Ethics  Don't send abusive messages.  Don't threaten anyone.  Don't put your personal information in a Blue Jack message.  Don't reveal yourself to the 'victim'.  Do disable Bluetooth if you don't want to be Blue Jacked.
  • 10. Related Concepts Related Concepts Bluesnarfing:  The theft of information form a wireless device through a Bluetooth connection.  This allows access to a calendar, contact list, emails and text messages.  Bluesnarfing is much more serious in relation to ‘Blue jacking’. Bluecasting:  Provision of any small digital media to suitable media provisioning devices over Bluetooth via the OBEX protocol. Bluebugging:   Blue bugging is a form of Bluetooth attack. Allows the user to take control of a victim’s phone to call the user’s phone enabled
  • 11. Earlier issue: Promotes an environment that puts consumer devices at greater risk.  Complete memory contents of some mobile phones can be accessed by a previously trusted paired device.  Phonebook and calendar can be obtained without owner’s knowledge.  Present Scenario: Primarily occurs in public spaces.  Security issues previously involved with blue jacking has been resolved.  In order for information to be duplicated, the devices would have to be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired. 
  • 12. Control Measures:  Turn off your Bluetooth device when not in use. Warning:  Never try to ‘hack’ a device.  Is an offence under the “computer misuse act 1990”.
  • 13. Conclusion  Blue jacking is a technique by which we can interact with new people.  It has ability to bring a revolution market by sending advertisement.