BLUE-JACKING
WHAT IS BLUEJACKING?
Bluejacking is used for sending unauthorized messages to
another Bluetooth device. Bluetooth is a high-speed but
very short-range wireless technology for exchanging data
between desktop and mobile computers and other devices.
ORIGIN OF BLUE JACKING
 Bluejacking was reportedly first carried out between
2001 and 2003 by a Malaysian IT consultant who used
his phone to advertise Ericsson to a single Nokia
7650 phone owner in a Malaysian bank
RANGE OF BLUEJACKING
 Bluejacking is completely based on the Bluetooth technology.
Bluetooth protocol can work within a very limited range usually
around 10 meters for mobile devices and up to 100 meters for laptop
computers.
SOFTWARE TOOLS
Blue-spam
Free-jack
E-jack
BLUE-SNARFING
 Blue-snarfing is the theft of information from a wireless device
through a Bluetooth connection. Bluetooth is a high-speed but
very short-range wireless technology for exchanging data
between desktop and mobile computers, personal digital
assistants (PDAs), and other devices.
BLUEBUGGING
 Bluebugging is a form of Bluetooth attack often caused by a lack of
awareness. It was developed after the onset of bluejacking and blue-
snarfing. Similar to blue-snarfing, bluebugging accesses and uses all
phone features[1] but is limited by the transmitting power of class 2
Bluetooth radios, normally capping its range at 10–15 meters.
ADVANTAGES & DISADVANTAGES
 Low cost.
 Easy to use.
 It can also penetrate through walls.
 It creates an Adhoc connection
immediately without any wires.
 It is used for voice and data transfer.
 Bluejacking is also confused with
Bluesnarfing which is the way in which
mobile phones are illegally hacked via
Bluetooth
 • Virus attacks
PREVENTION
• There is hardly any softaware available to prevent or detect
bluejacking.
• Turn off Bluetooth.
• Don’t put device in connectable mode.
CONCLUSION
 Bluejacking is a harmless and secure technology.
It does have some drawbacks but they can be
prevented by using certain measures. It does
have many advantages also.
THANK YOU

blue-JACKING.pptx

  • 1.
  • 2.
    WHAT IS BLUEJACKING? Bluejackingis used for sending unauthorized messages to another Bluetooth device. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers and other devices.
  • 3.
    ORIGIN OF BLUEJACKING  Bluejacking was reportedly first carried out between 2001 and 2003 by a Malaysian IT consultant who used his phone to advertise Ericsson to a single Nokia 7650 phone owner in a Malaysian bank
  • 4.
    RANGE OF BLUEJACKING Bluejacking is completely based on the Bluetooth technology. Bluetooth protocol can work within a very limited range usually around 10 meters for mobile devices and up to 100 meters for laptop computers.
  • 5.
  • 6.
    BLUE-SNARFING  Blue-snarfing isthe theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices.
  • 7.
    BLUEBUGGING  Bluebugging isa form of Bluetooth attack often caused by a lack of awareness. It was developed after the onset of bluejacking and blue- snarfing. Similar to blue-snarfing, bluebugging accesses and uses all phone features[1] but is limited by the transmitting power of class 2 Bluetooth radios, normally capping its range at 10–15 meters.
  • 8.
    ADVANTAGES & DISADVANTAGES Low cost.  Easy to use.  It can also penetrate through walls.  It creates an Adhoc connection immediately without any wires.  It is used for voice and data transfer.  Bluejacking is also confused with Bluesnarfing which is the way in which mobile phones are illegally hacked via Bluetooth  • Virus attacks
  • 9.
    PREVENTION • There ishardly any softaware available to prevent or detect bluejacking. • Turn off Bluetooth. • Don’t put device in connectable mode.
  • 10.
    CONCLUSION  Bluejacking isa harmless and secure technology. It does have some drawbacks but they can be prevented by using certain measures. It does have many advantages also.
  • 11.