This document provides an overview of bluejacking presented by Hammad Khan, Muhammad Adeel, Muzammil Naz, and Masood Karim. It defines bluejacking as sending anonymous messages to Bluetooth devices, discusses its history and how it works, statistics on common locations for it to occur, how to prevent being bluejacked, and ethics around the practice. It also covers related hacking techniques like bluesnarfing and bluebugging. The document provides security tips and discusses appropriate uses of bluejacking technology.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such. as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in. the name field (i.e for bluedating or bluechat) to another Bluetooth enabled device via the OBEX. protocol.
The information in this slide is not mine but it is adapted from various search engines and websites like google, yahoo, twitter etc. The theme of the slides is taken from slidesgo. you can find this theme under the category technology. Hope you guys like it and it helps you.
Presentation on Blue Jacking.
~ By The Avi Sharma
Presentation Download Link - https://www.slideshare.net/AvinashSha...
Follow us -
Youtube - https://www.youtube.com/watch?v=aVHWA23YB90
Instagram - https://instagram.com/the_avi_sharma_
Telegram - https://t.me/theavisharma
WhatsApp - https://chat.whatsapp.com/LcRzPABUGdZ5otH4mG6zIP
Bluetooth network-security-seminar-reportROHIT SAGAR
basic network to protect blue-tooth from any un-authorised persons and devices ;its vital importance is to protect and send the data with or without any encrypted key
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Mostly textual passwords follow an encryption algorithm as mentioned aboveBiometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning). Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
This is basically android app presentation on Bluetooth chat which i made for my academic purpose after that i think it is interesting and will be beneficial for others so i uploaded here. Please like my presentation if you r satisfied..... and give me your reviews.....
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such. as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in. the name field (i.e for bluedating or bluechat) to another Bluetooth enabled device via the OBEX. protocol.
The information in this slide is not mine but it is adapted from various search engines and websites like google, yahoo, twitter etc. The theme of the slides is taken from slidesgo. you can find this theme under the category technology. Hope you guys like it and it helps you.
Presentation on Blue Jacking.
~ By The Avi Sharma
Presentation Download Link - https://www.slideshare.net/AvinashSha...
Follow us -
Youtube - https://www.youtube.com/watch?v=aVHWA23YB90
Instagram - https://instagram.com/the_avi_sharma_
Telegram - https://t.me/theavisharma
WhatsApp - https://chat.whatsapp.com/LcRzPABUGdZ5otH4mG6zIP
Bluetooth network-security-seminar-reportROHIT SAGAR
basic network to protect blue-tooth from any un-authorised persons and devices ;its vital importance is to protect and send the data with or without any encrypted key
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Mostly textual passwords follow an encryption algorithm as mentioned aboveBiometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning). Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
This is basically android app presentation on Bluetooth chat which i made for my academic purpose after that i think it is interesting and will be beneficial for others so i uploaded here. Please like my presentation if you r satisfied..... and give me your reviews.....
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,etc.
Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Click and Dragger: Denial and Deception on Android mobilegrugq
A presentation on OPSEC for mobile phones, covering the design and reasoning behind the CryptogenMod ROM and the DarkMatter app.
Source for DarkMatter: https://github.com/grugq/darkmatter
Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
Ведущий: Джефф Кац
По прогнозам Cisco, в этом году 25 млрд устройств будут подключены к интернету, а к 2020 году число увеличится вдвое. Планируя разработку решения в сфере Интернета вещей (IoT), вы должны подумать о том, что в один прекрасный день к вам нагрянет ФСБ . Вопрос безопасности пользователей нужно продумать заранее, не следует откладывать его на потом. Докладчик расскажет, как использовать преимущества IoT-продуктов, не ущемляя личных прав ваших клиентов. Доклад сопровождается примерами услуг, в которых конфиденциальность и безопасность были обеспечены в начале разработки.
We help Small Business Owners to discover the best tools to be a smart mobile entrepreneur right away. We are offering a seminar every month to maximize the efficiency of the mobile tools we are using. We’ll teach how: The best mobile tools for you as an entrepreneur How can you improve your business image being mobile savy The latest mobile tips Barter your services and create new centers of influence We help small businesses to get a professional image with the right mobile tools
Locking Down Risks from Unlocking
How organizations can protect themselves from the security threats and liability of unlocked phones. While steep fines have placed the unlocking issue in the spotlight, savvy organizations will tell you that this is nothing new. For years, they have taken action to protect themselves from the security risks posed by unlocked or jailbroken phones.
The question now is –how far should they go in ensuring that their employees don’t jailbreak or unlock their phones?
Webinar covers:
• Security strategy best practices
• Acceptable use policy options
• Data protection
• Application management
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Bluejacking
1. PRESENTED BY : HAMMAD KHAN
MUHAMMAD ADEEL
MUZAMMIL NAZ
MASOOD KARIM
BLUEJACKING
2. TABLE OF CONTENTS
• Bluejacking
• History
• Bluejacking technology
• Places where Bluejack occurs Stats
• How it works
• How to Prevent Being Bluejacked
• Good Practices for Bluetooth Enabled Devices
• References
3. ”
“ Section : A
Bluejacking , History , Bluejacking technology & Places
where Bluejack occurs statistics
Presented By : Masood Karim
Let’s Start
4. BLUEJACKING
• Bluejacking is a hacking method that allows an individual to send
anonymous messages to Bluetooth-enabled devices within a certain
radius.
• First, the hacker scans his surroundings with a Bluetooth-enabled
device, searching for other devices. The hacker then sends an
unsolicited message to the detected devices.
• Bluejacking is also known as blue hacking.
5. HISTORY
• “Ajack” (Malaysian IT Consultant) posted a comment on a mobile phone forum.
• Ajack told IT Web that he used his Ericsson cell phone in a bank to send a message to someone with a
Nokia 7650.
• Ajack did a Bluetooth discovery to see if there was another Bluetooth device around.
• Discovering a Nokia 7650, he created a new contact and filled in the first name with ‘Buy Ericsson! and
sent a business card to the Nokia phone.
6. BLUEJACKING TECHNOLOGY
• Bluetooth technology : Bluetooth is a wireless technology standard for exchanging data over short
distances from fixed and mobile devices, and building personal area networks
• vCard : vCard, also known as VCF (Virtual Contact File), is a file format standard for electronic business
cards. vCard are often attached to e-mail messages, but can be exchanged in other ways, such as on the
World Wide Web or instant messaging. They can contain name and address information, telephone
numbers, e-mail addresses, URLs, logos, photographs, and audio clips.
• OBEX protocol : OBEX (abbreviation of OBject EXchange, also termed IrOBEX) is a communications
protocol that facilitates the exchange of binary objects between devices. It is maintained by the Infrared
Data Association but has also been adopted by the Bluetooth Special Interest Group
7. PLACES WHERE BLUEJACK OCCURS
Home
Cafes
Public transportation
Stores and shopping malls
Restaurants
Bars
0 5 10 15 20 25 30 35
8. ”
“ Section : B
How Bluejack works , How to Prevent Being Bluejacked & Good
Practices for Bluetooth Enabled Devices
Let’s Start
Presented By : Muhammad Adeel
9. HOW DOES THIS WORKS
• Step 1 – Create a new contact on the mobile phone’s contact list.
• Step 2 – Enter a “Bluejacking” message in the name field such as, “I am a master Bluejacking specialist.”
• Step 3 – Choose the new contact and select the “Send via Bluetooth” menu option. The purpose of this
option on mobile phones is to forward contact data to others.
• Step 4 – The phone will now display a list of devices that are in its range. If the phone cannot find a
device, it just means that it is not in range of a Bluetooth enabled device. Select a contact from the
listing and send a message.
• Step 5 – If a user chooses to Bluejack other devices, he/she should be aware of the security laws in
his/her place of residence. In some locations, sending unsolicited messages via Bluejacking may be
illegal.
10. HOW TO PREVENT BEING BLUEJACKED
• To prevent being Bluejacked, disable Bluetooth on the mobile device when not in use.
• The device will not show up on a “Bluejacker’s” phone when he/she attempts to send a message and
they do not queue up.
• Buy an E2X bag: It blocks all transmissions and receiving signals from leaving the bag.
11. GOOD PRACTICES FOR BLUETOOTH ENABLED DEVICES
• Whether someone is unwilling to partake in Bluejacking or just does not want to be bothered with
these messages, the following are some good practices to consider:
• Do not reveal an identity when either sending or receiving Bluejacked messages.
• Never threaten anyone.
• Never send messages that can be considered abusive.
• Never reveal personal information in response to a Bluejacked message.
• Disable Blue Tooth while away from one’s car or home in order to prevent Bluejacked messages.
• If a Bluejacking message is received, delete the message voice accepting it or it will be added to the
device’s address book.
13. BLUESNARFING
• The Bluesnarfing attack is much more damaging to the bluejacking technique as it enables you to
wirelessly connect to Bluetooth enables mobile phones without any knowledge from the owner and
copy their the mobile phone's address book, their SMS messages, their call logs
• Most bluesnarfing tools are downloaded as JAR files.
• The Bluesanrfing technique works like the Bluejacking technique by making use of the exchange of
business cards. This exchange is done using the OBEX protocol and enables the Bluetooth machine to
connect to the device which needs to be compromised but instead of exchanging a business card, it
request for information (the phonebook file, the call logs etc.) from the target.
14. BLUECASTING
• Advertising to users with Bluetooth cellphones.
• As people walk within the vicinity of a store and Bluetooth is turned on in their phones, a message can
be sent to the phone that entices them to come inside.
15. BLUEBUGGING
• The Bluebugging attack is more powerful than the bluejacking and bluesnarfing attacks.
• It allows the attacker to take complete control of your mobile phone without the user knowing
anything about it.
• They can make phone calls, listen to conversations where the phone is located. Bluesanrfing capabilities
also exist in bluebugging tools like copying the phone book and the phone's call list.
16. HOW TO BLUEJACK
• 1. Find a busy place where lots of mobile phones might be, such as shopping centres, trains, bars or
cinemas
• 2. Create a new entry in your phone's address book like 'Hi you've been bluejacked'. Attach a picture if
you want to.
• 3. Search the area for other Bluetooth phones to contact and choose one.
• 4. Send your message. They then receive the message, 'Hi you've been bluejacked'.
• 5. Keep a look out for when your 'victim' gets the message and the puzzled look on their face.
17. ”
“ Section : D
Security Tips to prevent attacks , Uses of Bluejacking & Code Of
Ethics
Presented By : Hammad Khan Laghari
Let’s Start
18. SECURITY TIPS TO PREVENT ATTACKS ON MOBILE PHONES:
• Enable Passcode Lock on Your phone
• The most basic precaution you can take is to enable passcode lock and set it to automatically engage after a brief period
of inactivity. By default, a passcode is not required to unlock the phone.
• Most people would put off this security measure for ease of use and convenience. However, the truth is that once you
have it enabled, it becomes second nature and you would not notice any difference. It is recommended that you set a
strong passcode. In the event of a physical theft, this will increase the effort required to compromise your phone.
• Disable Features That Could Be Accessed Without Entering the Passcode
• This would prevent the use of applications from your phone without your knowledge.
• Disable geotagging on the phone.
• This will prevent attackers find out where you are located.
19. CONTINUE
• Erase All the Data Before Return, Repair, or Resale of Your phone.
• Erase all confidential information so that attackers cannot retrieve your personal information.
• Regularly Update the phone's Firmware or Operating system.
• This will enable you to get the latest security features for your mobile phones.
• Disable Bluetooth When Not in Use
• Disabling Bluetooth when not in use will prevent attackers from getting access to you phone when not in use.
20. USES OF BLUEJACKING
• Busy shopping center
• Starbucks
• Train Station
• High Street
• On a train/ tube/ bus
• Cinema
• Café/ restaurant/ pub
• Mobile phone shop
• Electronics shop (e.g. Dixons)
22. ”
“Thank You Everyone Hope You’ve Find Useful Information
Presenter : Hammad Khan , Muhammad Adeel , Muzammil Naz & Masood Karim
Technology is a useful servant but a dangerous master.
23. FOR PRESENTER INFORMATION
• Bluetooth Special Interest Group (SIG) is the body that oversees the development of Bluetooth
standards and the licensing of the Bluetooth technologies and trademarks to manufacturers
• The Bluetooth protocol stack is split in two parts: a "controller stack" containing the timing critical radio
interface, and a "host stack" dealing with high level data. The controller stack is generally implemented
in a low cost silicon device containing the Bluetooth radio and a microprocessor. The host stack is
generally implemented as part of an operating system, or as an installable package on top of an
operating system.
24. FOR PRESENTER INFORMATION
• Connection Type Spread Spectrum (Frequency Hopping) & Time Division Duplex (1600 hops/sec)
• Spectrum 2.4 GHz ISM Open Band (79 MHz of spectrum = 79 channels)
• Modulation Gaussian Frequency Shift Keying Transmission Power 1 mw – 100 mw
• Data Rate 1 Mbps Range 30 ft Supported Stations 8 devices
• Data Security –Authentication Key 128 bit key
• Data Security –Encryption Key 8-128 bits (configurable) Module size 9 x 9 mm