SlideShare a Scribd company logo
PRESENTED BY:-KHEMRAJ SONI
(BCA-1,[BATCH-2])
Bluejaking
Here we’ll know:-
• What is Bluejacking.
• Origin of Bluejacking.
• First Bluejacked message.
• How to bluejack ??
• Uses & advantages.
• Disadvantages.
• Software tools.
• Prevent being bluejacked.
BLUEJACKING
BCA-1 (betch-2)Khemraj Soni
Bluejacking:-
•Bluejaking is sending of
unsolicited messages over
Bluetooth to Bluetooth enabled
devices.
BLUEJACKING
BCA-1 (betch-2)Khemraj Soni
Origin of Bluejacking:- BLUEJACKING
BCA-1 (betch-2)Khemraj Soni
The first Bluejack message was:-
BLUEJACKING
NOKIA 7650 :- First bluejacked phone
BCA-1 (betch-2)Khemraj Soni
To bluejack any device we need following:-
 Bluetooth enabled device.
 Person who know about bluejack.
 A place where people have their phone’s
Bluetooth enabled.
BLUEJACKING
BCA-1 (betch-2)
Khemraj Soni
How to bluejack:- BLUEJACKING
BCA-1 (betch-2)Khemraj Soni
1. 2. 3.
5. 6.
4.
7.
Bluejacking software tools
 Btcrawler.
 Blooover.
 BT Browser 2.0.
 Easy jack II.
 Blue diving.
 Super Bluetooth hack 1.08.
 Magic bluehack Etc.
BLUEJACKING
BCA-1 (betch-2)Khemraj Soni
Uses & advantages:-
• Gorilla marketing.
• Advertising.
• Free short messaging.
• Permission-based advertising.
• Pub, café , restaurant ,
shopping mall etc.
BLUEJACKING
BCA-1 (betch-2)
Khemraj Soni
Disadvantages:-
1. Don’t work in iPhone or iPad or Blackberry.
2. Harmless but people feel malfunctioning.
3. Can work maximum 10 meters to 100 meters
area only.
4. Multiple massages can’t possible.
BLUEJACKING
BCA-1 (betch-2)
Khemraj Soni
To prevent being Bluejacked, disable
Bluetooth of your mobile devices while it
is not in use.
BLUEJACKING
Prevent
BCA-1 (betch-2)Khemraj Soni
BLUEJACKING
BCA-1 (betch-2)Khemraj Soni
BCA-1 (betch-2)Khemraj Soni

More Related Content

What's hot

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejackingAkshita Pillai
 
Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
Rahul Raj
 
Bluejacking
BluejackingBluejacking
Bluejacking
VIKASH MEWAL
 
Bluejacking
BluejackingBluejacking
Bluejacking
Jyoti Chintadi
 
Bluejacking
BluejackingBluejacking
Bluejacking
ss30
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Prabhat Yadav
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
Bluejacking
BluejackingBluejacking
Bluejacking
Muhammad Adeel
 
bluejacking
bluejackingbluejacking
bluejacking
fsanakhan
 
Bluejacking
BluejackingBluejacking
Bluejacking
dixitas
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
YashwanthSampath1
 
Bluejacking
BluejackingBluejacking
Bluejacking
fsanakhan
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
BindhuBhargaviTalasi
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
The Avi Sharma
 
NFC solution -- C&T RF Antennas Inc
NFC solution -- C&T RF Antennas IncNFC solution -- C&T RF Antennas Inc
NFC solution -- C&T RF Antennas Inc
Antenna Manufacturer Coco
 
NFC for the Real World
NFC for the Real WorldNFC for the Real World
NFC for the Real WorldRobert Labancz
 
Near field communication
Near field communicationNear field communication
Near field communicationDheeraj Raja
 

What's hot (20)

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
NFC solution -- C&T RF Antennas Inc
NFC solution -- C&T RF Antennas IncNFC solution -- C&T RF Antennas Inc
NFC solution -- C&T RF Antennas Inc
 
NFC tech
NFC techNFC tech
NFC tech
 
NFC for the Real World
NFC for the Real WorldNFC for the Real World
NFC for the Real World
 
Near field communication
Near field communicationNear field communication
Near field communication
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 

Bluejacking by krishna soni

  • 2. Here we’ll know:- • What is Bluejacking. • Origin of Bluejacking. • First Bluejacked message. • How to bluejack ?? • Uses & advantages. • Disadvantages. • Software tools. • Prevent being bluejacked. BLUEJACKING BCA-1 (betch-2)Khemraj Soni
  • 3. Bluejacking:- •Bluejaking is sending of unsolicited messages over Bluetooth to Bluetooth enabled devices. BLUEJACKING BCA-1 (betch-2)Khemraj Soni
  • 4. Origin of Bluejacking:- BLUEJACKING BCA-1 (betch-2)Khemraj Soni
  • 5. The first Bluejack message was:- BLUEJACKING NOKIA 7650 :- First bluejacked phone BCA-1 (betch-2)Khemraj Soni
  • 6. To bluejack any device we need following:-  Bluetooth enabled device.  Person who know about bluejack.  A place where people have their phone’s Bluetooth enabled. BLUEJACKING BCA-1 (betch-2) Khemraj Soni
  • 7. How to bluejack:- BLUEJACKING BCA-1 (betch-2)Khemraj Soni 1. 2. 3. 5. 6. 4. 7.
  • 8. Bluejacking software tools  Btcrawler.  Blooover.  BT Browser 2.0.  Easy jack II.  Blue diving.  Super Bluetooth hack 1.08.  Magic bluehack Etc. BLUEJACKING BCA-1 (betch-2)Khemraj Soni
  • 9. Uses & advantages:- • Gorilla marketing. • Advertising. • Free short messaging. • Permission-based advertising. • Pub, café , restaurant , shopping mall etc. BLUEJACKING BCA-1 (betch-2) Khemraj Soni
  • 10. Disadvantages:- 1. Don’t work in iPhone or iPad or Blackberry. 2. Harmless but people feel malfunctioning. 3. Can work maximum 10 meters to 100 meters area only. 4. Multiple massages can’t possible. BLUEJACKING BCA-1 (betch-2) Khemraj Soni
  • 11. To prevent being Bluejacked, disable Bluetooth of your mobile devices while it is not in use. BLUEJACKING Prevent BCA-1 (betch-2)Khemraj Soni