PRESENTED BY:
NEHA SAHARE
SONALI SHUKLA
GUIDED BY:
PROF. ABHILASHA BORKAR
Introduction
History
Technologies
Bluetooth
vCard
OBEX protocol
How to bluejack
Applications
Advantages
Disadvantages
Conclusion
 Bluejacking is the sending of unwanted
messages over Bluetooth to Bluetooth-
enabled devices.
 It is done by sending a v-Card( Versit
Card).
 This technique is widely used for
promotional purpose.
Bluejacking was allegedly first conducted
by a Malaysian IT consultant, ‘Ajack’ who
used his Bluetooth-enabled phone to
publicize Sony Ericsson.
BLUEJACKING
TECHNOLOGIES
BLUETOOTH v-CARD
OBEX
protocol
 Wireless networking standard created for
personal networks (PANs).
 Has a very limited range.
 Easy way to send data.
 Electronic business
card.
 Identified by their .vcf
filename extensions.
 Designed to support
multiple languages.
 It is the heart of
file transfer over
bluetooth.
 It is a session layer
protocol.
 Optimized for ad-
hoc wireless links.
(i) (ii) (iii) (iv) (v)
1
•RED FANG
2
•BLUESNIFF
3
•BLUEBUG
GUERILLA
MARKETING
SOCIAL NETWORKING
OR GAMING
Mostly prone to bluejacking
 Copyright sound files will only be sent with
the written consent of the copyright holder.
 Can easily transfer data.
 Can enjoy music by wireless headphones.
 Vulnerable to virus attacks.
 Causes irritation in any person.
 Complete takeover of devices through a
Trojan horse program.
It is the modus operandi by which we can
network with new people and has the ability to
revolutionize market by propelling
advertisements about the products, services,
enterprises, etc. on the Bluetooth-configured
devices.
Bluejacking future prospects in the field of
advertising and marketing are vividly dazzling.
[1] International Journal of Engineering Trends
and Technology (IJETT) – Volume 4 Issue 7 July,
2013.
[2] International Journal Of Engineering And
Computer Science Volume 2 Issue 6 June, 2013.
[3] International Journal of Distributed and
Parallel Systems (IJDPS) Vol.3, No.1, January
2012.
Bluejacking

Bluejacking