Presented By
A. Mercy
S. Asvitha
(II B.Sc.[CS])
Introduction
 “Ajack” posted a comment on a mobile phone
forum.
 Ajack told IT Web that he used his Ericsson
cell phone in a bank to send a message to
someone with a Nokia 7650.
 Ajack did a Bluetooth discovery to see if there
was another Bluetooth device around.
Discovering a Nokia 7650, he created a new
contact and filled in the first name with ‘Buy
Ericsson! and sent a business card to the Nokia
phone.
To make sure that Bluetooth is enabled.
To read the handbook of the particular phone (or
PDA etc).
Phone or PDA will start to search the airwaves
for other devices within range.
To see a list of them appear, or it will say that it
cannot find any.
First press the 5way joystick down
Then choose "New
contact"
Then press done

Then choose options
Then in the first
line choose your
desired message
Then go to the contact

Then press options

Then choose "Via
Bluetooth"
Then select & send
your message

Then scroll down to
send
Then the phone will
search for enabled
Devices.
software tools
Blue spam:
Blue spam:
Searches for all discoverable Bluetooth devices.
Searches for all discoverable Bluetooth devices.
Sends aafile to them if they support OBEX.
Sends file to them if they support OBEX.

Meeting point:
Meeting point:
Perfect tool to search for bluetooth devices.
Perfect tool to search for bluetooth devices.
This software is compatible with pocket pc, windows.
This software is compatible with pocket pc, windows.

Free jack:
Free jack:
Compatible to java phone like Nokia N-series.
Compatible to java phone like Nokia N-series.

Easy jacking (eJack):
Easy jacking (eJack):
devices.
devices.

Allows sending of text Messages to other Bluetooth enabled
Allows sending of text Messages to other Bluetooth enabled
Usage Of Bluejacking









SY
BU ING
P
OP E R
SH N T
CE

Busy shopping centre
Railway Station
Café/ restaurant/ pub
On a train/ tube/ bus
High Street
Cinema
Mobile phone shop
Electronics shop

y
lw a
Rai tion
Sta

/
afé nt/
C
ura
st a b
re pu

/
rain
at
On e / b u s
tub

Hi

re
h St
g

et
Architecture
Piconet:

• The devices find each other and form a network called
“ piconet ” spontaneously.

• A piconet is a basic unit with up to 8 nodes.
• All communication are between master and slaves.
• Master controls clock and decides the time slot for the
device.

• In a piconet , there can be up to 255 parked nodes.
(i) Bluejacker - who carry out the bluejack.
(ii) Victim – Who receive the bluejack.
Code of Ethics

 Don't send abusive messages.
 Don't threaten anyone.
 Don't put your personal information in a Blue Jack message.
 Don't reveal yourself to the 'victim'.
 Do disable Bluetooth if you don't want to be Blue Jacked.
Related Concepts
Related Concepts

Bluesnarfing:


The theft of information form a wireless device through a Bluetooth
connection.

This allows access to a calendar, contact list, emails and text
messages.

Bluesnarfing is much more serious in relation to ‘Blue jacking’.

Bluecasting:


Provision of any small digital media to suitable media provisioning
devices over Bluetooth via the OBEX protocol.

Bluebugging:




Blue bugging is a form of Bluetooth attack.
Allows the user to take control of a victim’s
phone to call the user’s phone

enabled
Earlier issue:
Promotes an environment that puts consumer devices at greater risk.

Complete memory contents of some mobile phones can be accessed
by a previously trusted paired device.

Phonebook and calendar can be obtained without owner’s
knowledge.


Present Scenario:
Primarily occurs in public spaces.

Security issues previously involved with blue jacking has been
resolved.

In order for information to be duplicated, the devices would have to
be paired. Bluejacking does not require a password to be entered
and therefore the two devices are not paired.

Control Measures:
 Turn off your Bluetooth device when not in use.

Warning:

 Never try to ‘hack’ a device.
 Is an offence under the “computer misuse act
1990”.
Conclusion

 Blue jacking is a technique by which
we can interact with new people.
 It has ability to bring a revolution
market by sending advertisement.
Queries?

Blue jacking mercy

  • 1.
    Presented By A. Mercy S.Asvitha (II B.Sc.[CS])
  • 2.
  • 3.
     “Ajack” posteda comment on a mobile phone forum.  Ajack told IT Web that he used his Ericsson cell phone in a bank to send a message to someone with a Nokia 7650.  Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650, he created a new contact and filled in the first name with ‘Buy Ericsson! and sent a business card to the Nokia phone.
  • 4.
    To make surethat Bluetooth is enabled. To read the handbook of the particular phone (or PDA etc). Phone or PDA will start to search the airwaves for other devices within range. To see a list of them appear, or it will say that it cannot find any.
  • 5.
    First press the5way joystick down Then choose "New contact" Then press done Then choose options Then in the first line choose your desired message Then go to the contact Then press options Then choose "Via Bluetooth" Then select & send your message Then scroll down to send Then the phone will search for enabled Devices.
  • 6.
    software tools Blue spam: Bluespam: Searches for all discoverable Bluetooth devices. Searches for all discoverable Bluetooth devices. Sends aafile to them if they support OBEX. Sends file to them if they support OBEX. Meeting point: Meeting point: Perfect tool to search for bluetooth devices. Perfect tool to search for bluetooth devices. This software is compatible with pocket pc, windows. This software is compatible with pocket pc, windows. Free jack: Free jack: Compatible to java phone like Nokia N-series. Compatible to java phone like Nokia N-series. Easy jacking (eJack): Easy jacking (eJack): devices. devices. Allows sending of text Messages to other Bluetooth enabled Allows sending of text Messages to other Bluetooth enabled
  • 7.
    Usage Of Bluejacking         SY BUING P OP E R SH N T CE Busy shopping centre Railway Station Café/ restaurant/ pub On a train/ tube/ bus High Street Cinema Mobile phone shop Electronics shop y lw a Rai tion Sta / afé nt/ C ura st a b re pu / rain at On e / b u s tub Hi re h St g et
  • 8.
    Architecture Piconet: • The devicesfind each other and form a network called “ piconet ” spontaneously. • A piconet is a basic unit with up to 8 nodes. • All communication are between master and slaves. • Master controls clock and decides the time slot for the device. • In a piconet , there can be up to 255 parked nodes. (i) Bluejacker - who carry out the bluejack. (ii) Victim – Who receive the bluejack.
  • 9.
    Code of Ethics Don't send abusive messages.  Don't threaten anyone.  Don't put your personal information in a Blue Jack message.  Don't reveal yourself to the 'victim'.  Do disable Bluetooth if you don't want to be Blue Jacked.
  • 10.
    Related Concepts Related Concepts Bluesnarfing:  Thetheft of information form a wireless device through a Bluetooth connection.  This allows access to a calendar, contact list, emails and text messages.  Bluesnarfing is much more serious in relation to ‘Blue jacking’. Bluecasting:  Provision of any small digital media to suitable media provisioning devices over Bluetooth via the OBEX protocol. Bluebugging:   Blue bugging is a form of Bluetooth attack. Allows the user to take control of a victim’s phone to call the user’s phone enabled
  • 11.
    Earlier issue: Promotes anenvironment that puts consumer devices at greater risk.  Complete memory contents of some mobile phones can be accessed by a previously trusted paired device.  Phonebook and calendar can be obtained without owner’s knowledge.  Present Scenario: Primarily occurs in public spaces.  Security issues previously involved with blue jacking has been resolved.  In order for information to be duplicated, the devices would have to be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired. 
  • 12.
    Control Measures:  Turnoff your Bluetooth device when not in use. Warning:  Never try to ‘hack’ a device.  Is an offence under the “computer misuse act 1990”.
  • 13.
    Conclusion  Blue jackingis a technique by which we can interact with new people.  It has ability to bring a revolution market by sending advertisement.
  • 14.