SlideShare a Scribd company logo
SEMINAR ON
BLUEJACKING
PERSENTED BY-
PAYAL - 13/CS/57
PRIYANKA PARIA - 13/CS/63
MANJEET KUMAR - 13/CS/46
GUIDED BY:
Mrs. P.PRADHAN
CONTENTS
1. INTRODUCTION
2. BLUEJACKING CAN BE DONE IN..
3. TECHNOLOGY USED
4. BLUETOOTH TECHNOLOGY
5. OBEX PROTOCOL
6. WHAT DO YOU NEED?
7. HOW TO BLUEJACK?
8. USAGE OF BLUEJACKING?
9. WHERE?
10. CODE OF ETHICS
11. CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING
12. PREVENTIONS
13. CONCLUSIONS
INTRODUCTION
• Bluejacking is the sending of unsolicited messages over
Bluetooth-enabled devices.
• Bluejacking do not remove or alter any data from the
device.
• The person who is being attacked does not know any
information about the hacker except the name assigned
to the hacker’s mobile phone.
BLUEJACKING CAN BE DONE IN DEVICES LIKE
LAPTOP
MOBILE
COMPUTER
PDA(personal digital assistant)
TECHNOLOGY USED
• BLUETOOTH TECHNOLOGY.
• OBEX protocol.
BLUETOOTH TECHNOLGY
• Short private area that uses radio frequencies to
transmit data.
• Has a very limited range , usually 10 meters on mobile
phones and around 100 meters on laptops.
• Connects various devices alike laptop, camera, mobile,
mouse, etc.
OBEX PROTOCOL
• OBEX (abbreviation of Object Exchange) is a communication
protocol that facilitates the exchange of binary objects between
devices.
• Helps to exchange business card, data, even applications.
• Initially OBEX was designed for infrared, latterly now has been
adopted by BLUETOOTH also used over USB.
Wanna try Bluejack? What do you Need?
• A BLUETOOTH enabled cell phone.
• A place with a lot of people having their BLUETOOTH
device switched on.
• Good sense of humor.
Search for a crowded place
e.g. mall, bus stand etc.
Put “on” your Bluetooth
Search for devices with active Bluetooth
…and enjoy the confused look.
Open keypad
Options
New contact
Hey dear..U
are
Bluejacked !!!
Type your desired
message in the name
field.
Press Done
Contact
Options
Scroll down to
“Send”
Choose
“via Bluetooth”
Searching…
Phone will search for enabled
devices
Select and
send your
message
Enjoy..!!!
Enjoyed it…???
Yesss !!
USAGE OF BLUEJACKING
• Advertisement
• Complimentary Messages
• Unethical usages
Where?
• Shopping mall
• Train station
• Cinema hall
• Café/ Pub
• Classroom
CODE OF ETHICS
• Do not hack any device.
• Do not send any abusive messages.
• Do not threaten anyone.
• Must not reveal yourself to the victim.
RELATED CONCEPTS
• BLUESNARFING
• BLUEBUGGING
BLUESNARFING
• Stealing of information from victim’s Bluetooth device
often between phone, laptops, PDA’s , etc.
• This allows access to a calendar, contact list, emails
and sms and moreover some user can steal even images
and private videos.
BLUEBUGGING
• Form of Bluetooth Attack.
• Allows user to take control of a victim’s phone to
call the user’s phone and can even send messages.
• Mechanism is being carried out using Laptop, with
the use of powerful PDAs and mobile devices.
MEASURES/PREVENTIONS
• TURN OFF BLUETOOTH device until when not
in use.
• Set the BLUETOOTH device to HIDDEN mode.
CONCLUSION
BLUEJACKING is a technique by which we can interact with
a new person and can bring a great change in the world of
advertisement by sending about the products, enterprises
etc. on the Bluetooth.
So we conclude that in future this technology becomes the
key for advertisement to interact with the world.
REFRENCES
• http://en.wikipedia.org/wiki/Bluejacking
• http://www.seminarsonly.com/computer%20scie
nce/Bluejacking.php
• http://www.slideshare.net
• http://electronics.howstuffworks.com/bluejacking
.htm
ANY QUESTIONS ?

More Related Content

What's hot

BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
The Avi Sharma
 
bluejacking
bluejackingbluejacking
bluejacking
Jyoti Chintadi
 
Bluejacking
BluejackingBluejacking
Bluejacking
Jyoti Chintadi
 
Bluejacking
BluejackingBluejacking
Bluejacking
dixitas
 
Bluejacking
BluejackingBluejacking
Bluejacking
ss30
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
Varna Shankar
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
BindhuBhargaviTalasi
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
sai krish
 
Bluetooth
BluetoothBluetooth
Bluetooth
Priyanka Anni
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
politegcuf
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technologypariluv
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
kamesh0007
 
silent sound new by RAJ NIRANJAN
silent sound new by RAJ NIRANJANsilent sound new by RAJ NIRANJAN
silent sound new by RAJ NIRANJAN
Raj Niranjan
 
Google loon ppt
Google loon pptGoogle loon ppt
Google loon ppt
BRIJESH SINGH
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
Maulik Patel
 

What's hot (20)

BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
 
silent sound new by RAJ NIRANJAN
silent sound new by RAJ NIRANJANsilent sound new by RAJ NIRANJAN
silent sound new by RAJ NIRANJAN
 
Google loon ppt
Google loon pptGoogle loon ppt
Google loon ppt
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
Google glass
Google glassGoogle glass
Google glass
 

Similar to Final bluejacking

Bluejacking
BluejackingBluejacking
Bluejacking
VIKASH MEWAL
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
Niki mundra
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
vihangshah12
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
22R25A0507PONNALOKES
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
YashwanthSampath1
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
ShritamKumarMund
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
Mercy Amirthakani
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
VictorYee
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
Shravani Patil
 
bluejacking
bluejackingbluejacking
bluejacking
fsanakhan
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
shanofa sanu
 
iGUARD: An Intelligent Way To Secure - Presentation
iGUARD: An Intelligent Way To Secure - PresentationiGUARD: An Intelligent Way To Secure - Presentation
iGUARD: An Intelligent Way To Secure - Presentation
Nandu B Rajan
 
Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptx
VivekanandaGN1
 
Bluetooth
BluetoothBluetooth
Bluetooth
kajalsingh177
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
vuttarkarrsreekanthr
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
G Prachi
 
Bluejacking
BluejackingBluejacking
Bluejacking
fsanakhan
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad1122334411223344
 
Bluetooth technology 31 12
Bluetooth technology 31 12Bluetooth technology 31 12
Bluetooth technology 31 12
mohamedobaid
 

Similar to Final bluejacking (20)

SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
iGUARD: An Intelligent Way To Secure - Presentation
iGUARD: An Intelligent Way To Secure - PresentationiGUARD: An Intelligent Way To Secure - Presentation
iGUARD: An Intelligent Way To Secure - Presentation
 
Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad
 
Bluetooth technology 31 12
Bluetooth technology 31 12Bluetooth technology 31 12
Bluetooth technology 31 12
 

Recently uploaded

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

Final bluejacking

  • 1. SEMINAR ON BLUEJACKING PERSENTED BY- PAYAL - 13/CS/57 PRIYANKA PARIA - 13/CS/63 MANJEET KUMAR - 13/CS/46 GUIDED BY: Mrs. P.PRADHAN
  • 2. CONTENTS 1. INTRODUCTION 2. BLUEJACKING CAN BE DONE IN.. 3. TECHNOLOGY USED 4. BLUETOOTH TECHNOLOGY 5. OBEX PROTOCOL 6. WHAT DO YOU NEED? 7. HOW TO BLUEJACK? 8. USAGE OF BLUEJACKING? 9. WHERE? 10. CODE OF ETHICS 11. CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING 12. PREVENTIONS 13. CONCLUSIONS
  • 3. INTRODUCTION • Bluejacking is the sending of unsolicited messages over Bluetooth-enabled devices. • Bluejacking do not remove or alter any data from the device. • The person who is being attacked does not know any information about the hacker except the name assigned to the hacker’s mobile phone.
  • 4. BLUEJACKING CAN BE DONE IN DEVICES LIKE LAPTOP MOBILE COMPUTER PDA(personal digital assistant)
  • 5. TECHNOLOGY USED • BLUETOOTH TECHNOLOGY. • OBEX protocol.
  • 6. BLUETOOTH TECHNOLGY • Short private area that uses radio frequencies to transmit data. • Has a very limited range , usually 10 meters on mobile phones and around 100 meters on laptops. • Connects various devices alike laptop, camera, mobile, mouse, etc.
  • 7. OBEX PROTOCOL • OBEX (abbreviation of Object Exchange) is a communication protocol that facilitates the exchange of binary objects between devices. • Helps to exchange business card, data, even applications. • Initially OBEX was designed for infrared, latterly now has been adopted by BLUETOOTH also used over USB.
  • 8. Wanna try Bluejack? What do you Need? • A BLUETOOTH enabled cell phone. • A place with a lot of people having their BLUETOOTH device switched on. • Good sense of humor.
  • 9. Search for a crowded place e.g. mall, bus stand etc. Put “on” your Bluetooth Search for devices with active Bluetooth …and enjoy the confused look.
  • 10. Open keypad Options New contact Hey dear..U are Bluejacked !!! Type your desired message in the name field. Press Done Contact Options Scroll down to “Send” Choose “via Bluetooth” Searching… Phone will search for enabled devices Select and send your message Enjoy..!!!
  • 12. USAGE OF BLUEJACKING • Advertisement • Complimentary Messages • Unethical usages
  • 13. Where? • Shopping mall • Train station • Cinema hall • Café/ Pub • Classroom
  • 14. CODE OF ETHICS • Do not hack any device. • Do not send any abusive messages. • Do not threaten anyone. • Must not reveal yourself to the victim.
  • 16. BLUESNARFING • Stealing of information from victim’s Bluetooth device often between phone, laptops, PDA’s , etc. • This allows access to a calendar, contact list, emails and sms and moreover some user can steal even images and private videos.
  • 17. BLUEBUGGING • Form of Bluetooth Attack. • Allows user to take control of a victim’s phone to call the user’s phone and can even send messages. • Mechanism is being carried out using Laptop, with the use of powerful PDAs and mobile devices.
  • 18. MEASURES/PREVENTIONS • TURN OFF BLUETOOTH device until when not in use. • Set the BLUETOOTH device to HIDDEN mode.
  • 19. CONCLUSION BLUEJACKING is a technique by which we can interact with a new person and can bring a great change in the world of advertisement by sending about the products, enterprises etc. on the Bluetooth. So we conclude that in future this technology becomes the key for advertisement to interact with the world.
  • 20. REFRENCES • http://en.wikipedia.org/wiki/Bluejacking • http://www.seminarsonly.com/computer%20scie nce/Bluejacking.php • http://www.slideshare.net • http://electronics.howstuffworks.com/bluejacking .htm
  • 21.