SlideShare a Scribd company logo
www.studymafia.org
Submitted To: Submitted By:
www.studymafia.org www.studymafia.org
Seminar
On
Bluejacking
 Introduction
 Bluejacking Technology
 Architecture
 Technical Features
 How to Bluejack
 Usage of bluejacking
 Related concepts
 Future aspects
 Conclusion
 Reference
• Bluejacking
– Sending of unsolicited messages over Bluetooth to
Bluetooth-enabled devices such as mobile phones,
PDAs or laptop computers via the OBEX protocol.
• Origin
– Started after a Malaysian IT consultant named
“Ajack” posted a comment on a mobile phone forum.
 Bluetooth technology
 vCard
 OBEX protocol
• Short range wireless LAN
• Connects numerous devices of different functions like telephones,
notebooks, computers, digital cameras etc. , in Personal Area
Network (PAN).
• Three areas - Data and Voice access points, Cable replacement, and
Ad hoc networking.
• Supports point - to - point as well as multi-point.
• Low power
• Low cost single chip radio – feasible
Piconet
• The devices find each other and form a network called “
piconet ” spontaneously.
• A piconet is a basic unit with up to 8 nodes, one of which
is a master and up to seven active slave nodes within a
maximum distance of 10 meters.
• All communication between master and slaves.
• Piconet is a centralized TDM system.
• Master controls clock and decides the time slot for the
device.
• In a piconet , there can be up to 255 parked nodes.
• Master switches to low power state and parked node wait
for beacon from master.
Connection Type
Spread Spectrum (Frequency Hopping)
& Time Division Duplex (1600
hops/sec)
Spectrum
2.4 GHz ISM Open Band (79 MHz of
spectrum = 79 channels)
Modulation Gaussian Frequency Shift Keying
Transmission Power 1 mw – 100 mw
Data Rate 1 Mbps
Range 30 ft
Supported Stations 8 devices
Data Security –Authentication
Key
128 bit key
Data Security –Encryption Key 8-128 bits (configurable)
Module size 9 x 9 mm
 Classification of devices on the basis of Power
dissipated & corresponding maximum Range.
POWER RANGE
CLASS I 20 dBm 100 m
CLASS II 0-4 dBm 10 m
CLASS III 0 dBm 1 m
• Mobile
• Personal computers
• Software tools
– Bluespam
• Searches for all discoverable Bluetooth devices and
sends a file to them (spam's them) if they support
OBEX.
• By default a small text will be send.
 Customize the message that should be send you need
a palm with an SD/MMC card, then you create the
directory /PALM/programs/BlueSpam/ Send/ and put
the file you would like to in into this directory. Activity is
logged to /PALM/programs/BlueSpam/Log/log.txt.
› Mobiluck
› Meeting point
 Is compatible with pocket PC, palm, Windows.
› Proximity mail
› Easyjack
› Freejack
 Freejack is compatible to java phone like Nokia N-
series.
 Busy shopping centre
 Starbucks
 Train Station
 High Street
 On a train/ tube/ bus
 Cinema
 Café/ restaurant/ pub
 Mobile phone shop
 Electronics shop (e.g. Dixons)
0 5 10 15 20 25 30 35
Public transportation
Stores ans shopping malls
Restaurants
Bars
Cafés
Home
Places where bluejack occures
 Advertisement
 Marketing opportunity
› Viral communication
› Community activities
› Location based service
 Do not hack any device
 Don't send abusive messages
 Don't threaten anyone
 Don't put your personal information in a BlueJack message
 Don't reveal yourself to the 'victim'
 Do disable Bluetooth if you don't want to be BlueJacked
 Bluesnarfing
 Bluecasting
 Bluebugging
 Is the unauthorized access of information
from a wireless device through a Bluetooth
connection, often between phones,
desktops, laptops, and PDAs.
 Even if your device is hidden bluesnarfing
can also be done.
 Provision of any small digital media to
suitable media provisioning enabled devices
over Bluetooth via the OBEX protocol.
 Form of Bluetooth attack.
 Allows the user to take control of a victim's
phone to call the user's phone.
 Earlier issue
 Promotes an environment that puts consumer devices
at greater risk.
 Complete memory contents of some mobile phones
can be accessed by a previously trusted paired
device.
 Phonebook and calendar can be obtained without
owners knowledge.
 Present Scenario
 primarily occurs in public spaces
 Security issues previously involved with
bluejacking has been resolved.
 In order for information to be duplicated, the devices
would have to be paired. Bluejacking does not require
a password to be entered and therefore the two
devices are not paired
 Turn off your Bluetooth device until you need
to communicate with another user.
 Buy an E2X bag.
› It blocks all transmissions and receiving signals
from leaving the bag.
 Act as major sale tool
 learn user preferences by placing options
like "more ads like this" and "less ads like
this" in each advertisement.
 Because of its low cost and power
consumption this technology has a great
future ahead.
 www.google.com
 www.wikipedia.com
 www.studymafia.org
Thanks
Bluejacking ppt.pptx

More Related Content

Similar to Bluejacking ppt.pptx

Bluetooth
BluetoothBluetooth
Bluetooth
Bluetooth Bluetooth
Bluetooth
Sajan Sahu
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technologyDavid Livingston J
 
Bluetooth
BluetoothBluetooth
Bluetooth
nayakslideshare
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
Engr Sid
 
Bluetooth
BluetoothBluetooth
Bluetooth
mylove25252
 
bluejacking
bluejackingbluejacking
bluejacking
Jyoti Chintadi
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
Suman Bhattacharyya
 
Bluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia TechnologyBluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia Technology
Pratikdd
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
lurdhu agnes
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad1122334411223344
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
DrTThendralCompSci
 
R1x g17 bluetooth i
R1x g17 bluetooth iR1x g17 bluetooth i
R1x g17 bluetooth i
cairo university
 

Similar to Bluejacking ppt.pptx (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Blutooth technology
Blutooth technologyBlutooth technology
Blutooth technology
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
bluejacking
bluejackingbluejacking
bluejacking
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia TechnologyBluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia Technology
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
 
R1x g17 bluetooth i
R1x g17 bluetooth iR1x g17 bluetooth i
R1x g17 bluetooth i
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Bluejacking ppt.pptx

  • 1. www.studymafia.org Submitted To: Submitted By: www.studymafia.org www.studymafia.org Seminar On Bluejacking
  • 2.  Introduction  Bluejacking Technology  Architecture  Technical Features  How to Bluejack  Usage of bluejacking  Related concepts  Future aspects  Conclusion  Reference
  • 3. • Bluejacking – Sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers via the OBEX protocol. • Origin – Started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.
  • 4.  Bluetooth technology  vCard  OBEX protocol
  • 5. • Short range wireless LAN • Connects numerous devices of different functions like telephones, notebooks, computers, digital cameras etc. , in Personal Area Network (PAN). • Three areas - Data and Voice access points, Cable replacement, and Ad hoc networking. • Supports point - to - point as well as multi-point. • Low power • Low cost single chip radio – feasible
  • 6. Piconet • The devices find each other and form a network called “ piconet ” spontaneously. • A piconet is a basic unit with up to 8 nodes, one of which is a master and up to seven active slave nodes within a maximum distance of 10 meters. • All communication between master and slaves. • Piconet is a centralized TDM system. • Master controls clock and decides the time slot for the device. • In a piconet , there can be up to 255 parked nodes. • Master switches to low power state and parked node wait for beacon from master.
  • 7.
  • 8. Connection Type Spread Spectrum (Frequency Hopping) & Time Division Duplex (1600 hops/sec) Spectrum 2.4 GHz ISM Open Band (79 MHz of spectrum = 79 channels) Modulation Gaussian Frequency Shift Keying Transmission Power 1 mw – 100 mw Data Rate 1 Mbps Range 30 ft Supported Stations 8 devices Data Security –Authentication Key 128 bit key Data Security –Encryption Key 8-128 bits (configurable) Module size 9 x 9 mm
  • 9.  Classification of devices on the basis of Power dissipated & corresponding maximum Range. POWER RANGE CLASS I 20 dBm 100 m CLASS II 0-4 dBm 10 m CLASS III 0 dBm 1 m
  • 10. • Mobile • Personal computers • Software tools – Bluespam • Searches for all discoverable Bluetooth devices and sends a file to them (spam's them) if they support OBEX. • By default a small text will be send.
  • 11.  Customize the message that should be send you need a palm with an SD/MMC card, then you create the directory /PALM/programs/BlueSpam/ Send/ and put the file you would like to in into this directory. Activity is logged to /PALM/programs/BlueSpam/Log/log.txt. › Mobiluck
  • 12. › Meeting point  Is compatible with pocket PC, palm, Windows. › Proximity mail › Easyjack › Freejack  Freejack is compatible to java phone like Nokia N- series.
  • 13.  Busy shopping centre  Starbucks  Train Station  High Street  On a train/ tube/ bus  Cinema  Café/ restaurant/ pub  Mobile phone shop  Electronics shop (e.g. Dixons)
  • 14. 0 5 10 15 20 25 30 35 Public transportation Stores ans shopping malls Restaurants Bars Cafés Home Places where bluejack occures
  • 15.  Advertisement  Marketing opportunity › Viral communication › Community activities › Location based service
  • 16.  Do not hack any device  Don't send abusive messages  Don't threaten anyone  Don't put your personal information in a BlueJack message  Don't reveal yourself to the 'victim'  Do disable Bluetooth if you don't want to be BlueJacked
  • 18.  Is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs.  Even if your device is hidden bluesnarfing can also be done.
  • 19.  Provision of any small digital media to suitable media provisioning enabled devices over Bluetooth via the OBEX protocol.
  • 20.  Form of Bluetooth attack.  Allows the user to take control of a victim's phone to call the user's phone.
  • 21.  Earlier issue  Promotes an environment that puts consumer devices at greater risk.  Complete memory contents of some mobile phones can be accessed by a previously trusted paired device.  Phonebook and calendar can be obtained without owners knowledge.
  • 22.  Present Scenario  primarily occurs in public spaces  Security issues previously involved with bluejacking has been resolved.  In order for information to be duplicated, the devices would have to be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired
  • 23.  Turn off your Bluetooth device until you need to communicate with another user.  Buy an E2X bag. › It blocks all transmissions and receiving signals from leaving the bag.
  • 24.  Act as major sale tool  learn user preferences by placing options like "more ads like this" and "less ads like this" in each advertisement.
  • 25.  Because of its low cost and power consumption this technology has a great future ahead.