SEMINAR ON
BLUEJACKING
PERSENTED BY-
PAYAL - 13/CS/57
PRIYANKA PARIA - 13/CS/63
MANJEET KUMAR - 13/CS/46
GUIDED BY:
Mrs. P.PRADHAN
CONTENTS
1. INTRODUCTION
2. BLUEJACKING CAN BE DONE IN..
3. TECHNOLOGY USED
4. BLUETOOTH TECHNOLOGY
5. OBEX PROTOCOL
6. WHAT DO YOU NEED?
7. HOW TO BLUEJACK?
8. USAGE OF BLUEJACKING?
9. WHERE?
10. CODE OF ETHICS
11. CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING
12. PREVENTIONS
13. CONCLUSIONS
INTRODUCTION
• Bluejacking is the sending of unsolicited messages over
Bluetooth-enabled devices.
• Bluejacking do not remove or alter any data from the
device.
• The person who is being attacked does not know any
information about the hacker except the name assigned
to the hacker’s mobile phone.
BLUEJACKING CAN BE DONE IN DEVICES LIKE
LAPTOP
MOBILE
COMPUTER
PDA(personal digital assistant)
TECHNOLOGY USED
• BLUETOOTH TECHNOLOGY.
• OBEX protocol.
BLUETOOTH TECHNOLGY
• Short private area that uses radio frequencies to
transmit data.
• Has a very limited range , usually 10 meters on mobile
phones and around 100 meters on laptops.
• Connects various devices alike laptop, camera, mobile,
mouse, etc.
OBEX PROTOCOL
• OBEX (abbreviation of Object Exchange) is a communication
protocol that facilitates the exchange of binary objects between
devices.
• Helps to exchange business card, data, even applications.
• Initially OBEX was designed for infrared, latterly now has been
adopted by BLUETOOTH also used over USB.
Wanna try Bluejack? What do you Need?
• A BLUETOOTH enabled cell phone.
• A place with a lot of people having their BLUETOOTH
device switched on.
• Good sense of humor.
Search for a crowded place
e.g. mall, bus stand etc.
Put “on” your Bluetooth
Search for devices with active Bluetooth
…and enjoy the confused look.
Open keypad
Options
New contact
Hey dear..U
are
Bluejacked !!!
Type your desired
message in the name
field.
Press Done
Contact
Options
Scroll down to
“Send”
Choose
“via Bluetooth”
Searching…
Phone will search for enabled
devices
Select and
send your
message
Enjoy..!!!
Enjoyed it…???
Yesss !!
USAGE OF BLUEJACKING
• Advertisement
• Complimentary Messages
• Unethical usages
Where?
• Shopping mall
• Train station
• Cinema hall
• Café/ Pub
• Classroom
CODE OF ETHICS
• Do not hack any device.
• Do not send any abusive messages.
• Do not threaten anyone.
• Must not reveal yourself to the victim.
RELATED CONCEPTS
• BLUESNARFING
• BLUEBUGGING
BLUESNARFING
• Stealing of information from victim’s Bluetooth device
often between phone, laptops, PDA’s , etc.
• This allows access to a calendar, contact list, emails
and sms and moreover some user can steal even images
and private videos.
BLUEBUGGING
• Form of Bluetooth Attack.
• Allows user to take control of a victim’s phone to
call the user’s phone and can even send messages.
• Mechanism is being carried out using Laptop, with
the use of powerful PDAs and mobile devices.
MEASURES/PREVENTIONS
• TURN OFF BLUETOOTH device until when not
in use.
• Set the BLUETOOTH device to HIDDEN mode.
CONCLUSION
BLUEJACKING is a technique by which we can interact with
a new person and can bring a great change in the world of
advertisement by sending about the products, enterprises
etc. on the Bluetooth.
So we conclude that in future this technology becomes the
key for advertisement to interact with the world.
REFRENCES
• http://en.wikipedia.org/wiki/Bluejacking
• http://www.seminarsonly.com/computer%20scie
nce/Bluejacking.php
• http://www.slideshare.net
• http://electronics.howstuffworks.com/bluejacking
.htm
ANY QUESTIONS ?

Final bluejacking

  • 1.
    SEMINAR ON BLUEJACKING PERSENTED BY- PAYAL- 13/CS/57 PRIYANKA PARIA - 13/CS/63 MANJEET KUMAR - 13/CS/46 GUIDED BY: Mrs. P.PRADHAN
  • 2.
    CONTENTS 1. INTRODUCTION 2. BLUEJACKINGCAN BE DONE IN.. 3. TECHNOLOGY USED 4. BLUETOOTH TECHNOLOGY 5. OBEX PROTOCOL 6. WHAT DO YOU NEED? 7. HOW TO BLUEJACK? 8. USAGE OF BLUEJACKING? 9. WHERE? 10. CODE OF ETHICS 11. CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING 12. PREVENTIONS 13. CONCLUSIONS
  • 3.
    INTRODUCTION • Bluejacking isthe sending of unsolicited messages over Bluetooth-enabled devices. • Bluejacking do not remove or alter any data from the device. • The person who is being attacked does not know any information about the hacker except the name assigned to the hacker’s mobile phone.
  • 4.
    BLUEJACKING CAN BEDONE IN DEVICES LIKE LAPTOP MOBILE COMPUTER PDA(personal digital assistant)
  • 5.
    TECHNOLOGY USED • BLUETOOTHTECHNOLOGY. • OBEX protocol.
  • 6.
    BLUETOOTH TECHNOLGY • Shortprivate area that uses radio frequencies to transmit data. • Has a very limited range , usually 10 meters on mobile phones and around 100 meters on laptops. • Connects various devices alike laptop, camera, mobile, mouse, etc.
  • 7.
    OBEX PROTOCOL • OBEX(abbreviation of Object Exchange) is a communication protocol that facilitates the exchange of binary objects between devices. • Helps to exchange business card, data, even applications. • Initially OBEX was designed for infrared, latterly now has been adopted by BLUETOOTH also used over USB.
  • 8.
    Wanna try Bluejack?What do you Need? • A BLUETOOTH enabled cell phone. • A place with a lot of people having their BLUETOOTH device switched on. • Good sense of humor.
  • 9.
    Search for acrowded place e.g. mall, bus stand etc. Put “on” your Bluetooth Search for devices with active Bluetooth …and enjoy the confused look.
  • 10.
    Open keypad Options New contact Heydear..U are Bluejacked !!! Type your desired message in the name field. Press Done Contact Options Scroll down to “Send” Choose “via Bluetooth” Searching… Phone will search for enabled devices Select and send your message Enjoy..!!!
  • 11.
  • 12.
    USAGE OF BLUEJACKING •Advertisement • Complimentary Messages • Unethical usages
  • 13.
    Where? • Shopping mall •Train station • Cinema hall • Café/ Pub • Classroom
  • 14.
    CODE OF ETHICS •Do not hack any device. • Do not send any abusive messages. • Do not threaten anyone. • Must not reveal yourself to the victim.
  • 15.
  • 16.
    BLUESNARFING • Stealing ofinformation from victim’s Bluetooth device often between phone, laptops, PDA’s , etc. • This allows access to a calendar, contact list, emails and sms and moreover some user can steal even images and private videos.
  • 17.
    BLUEBUGGING • Form ofBluetooth Attack. • Allows user to take control of a victim’s phone to call the user’s phone and can even send messages. • Mechanism is being carried out using Laptop, with the use of powerful PDAs and mobile devices.
  • 18.
    MEASURES/PREVENTIONS • TURN OFFBLUETOOTH device until when not in use. • Set the BLUETOOTH device to HIDDEN mode.
  • 19.
    CONCLUSION BLUEJACKING is atechnique by which we can interact with a new person and can bring a great change in the world of advertisement by sending about the products, enterprises etc. on the Bluetooth. So we conclude that in future this technology becomes the key for advertisement to interact with the world.
  • 20.
    REFRENCES • http://en.wikipedia.org/wiki/Bluejacking • http://www.seminarsonly.com/computer%20scie nce/Bluejacking.php •http://www.slideshare.net • http://electronics.howstuffworks.com/bluejacking .htm
  • 22.