Blue jacking
CONTENTS
 INTRODUCTION OF BLUE
JACKING
 BLUETOOTH
 HOW TO BLUE JACK
 STEPS
 SOFTWARE TOOLS
 USAGE OF BLUE JACKING
 PLACES
 SECURITY ISSUE
 RELATED CONCEPTS
 PREVENTION
 CONCLUSION
INTRODUCTION OF
BLUEJACKING
BLUEJACKING is the sending of
unsolicited messages over bluetooth to
bluetooth enabled devices via the
OBEX protocal
What is luetooth
Bluetooth is define as a wirless technology that
provides short range communications.
Bluetooth devices connect have the ability to connect
with up to seven devices per piconet
How to bluejack
 To make sure that bluetooth is
enabled.
 To read the hand book of the
particular Phone PDA etc
 phone and laptop will start searching
airwaves for other devices with in
range
 To see a list of them appears, or it will
take cannot find any
STEPS
Software tools
Bluespam
Free jack
E-jack
Blue spam:
 Searches for all discoverable bluetooth devices.
 Send a file to them if they support OBEX
Free jack:
Compatible to java phone like nokia
N-series
Easy jack:
Allows sending of text messages to
other bluetooth devices enables
Related concepts
Bluesnarfing
Bluecasting
bluebugging
 Is the unauthorized access the information from a
wireless device through a bluetooth connection,
often between phone, desktops, laptops, and PDAs
 even if your device is hidden bluesnarfing can also
be done
Provision of any small media to
suitable media provisioning enabled
devices over bluetooth
Form of bluetooth attacks
Allows the user to take control
of a victim’s phone to call the
user’s phone
Thank you

bluejacking