SlideShare ist ein Scribd-Unternehmen logo
1 von 20
SEMINAR ON

BLUEJACKING

GUIDED BY:
Dr. V.K.PATLE
SWARNIMA SHRIVASTAVA

SUBMITTED BYAKSHITA PILLAI
MCA 2nd SEM
OUTLINES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.

INTRODUCTION
BLUEJACKING CAN BE DONE IN..
TECHNOLOGY USED
BLUETOOTH TECHNOLOGY
OBEX PROTOCOL
REQUIREMENTS
HOW TO BLUEJACK?
USAGE OF BLUEJACKING
CODE OF ETHICS
CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING
PREVENTIONS
CONCLUSIONS
INTRODUCTION
• Bluejacking is sending of unsolicited message
over Bluetooth to Bluetooth-Enabled devices such
as mobile phone, PDA or Laptops, by sending a
vCard which typically contain a message in the
name field via OBEX protocol.
• Bluejacking do not remove or alter any data from
the device.
• The person who is being attacked does not know
any information about the hacker except the name
assigned to the hacker’s mobile phone.
BLUEJACKING CAN BE DONE IN
DEVICES LIKE

LAPTOP
MOBILE
COMPUTER

PDA(personal digital assistant)
TECHNOLOGY USED
• BLUETOOTH TECHNOLOGY.
• OBEX protocol.
BLUETOOTH TECHNOLGY
• Short private area that uses radio frequencies to
transmit data.
• Has a very limited range , usually 10 meters on
mobile phones and around 100 meters on laptops.
• Connects
various
devices
alike
laptop
, camera, mobile, mouse, etc. in a PAN (Personal
Area Network).
• Low power.
• Low cost.
EXAMPLE OF BLUETOOTH TECH.
ALL ARE BLUETOOTH ENABLED DEVICES
Map automatically

CELL
PHONE
CAR

COMPUTER
Sent to pc

Cell phone picked up
Bluetooth signal from pc
& automatically sent the
data you want to transfer
to computer

after 5 mins.
Home phone picked up
the Bluetooth signal from
your cell phone &
automatically re-routed
the call

FRIEND
CALLS YOU

HOME PHONE
RINGS
OBEX PROTOCOL
• OBEX (abbreviation of Object Exchange) is a
communication protocol that facilitates the exchange
of binary objects between devices.
• Helps to exchange business card , data , even
applications.
• Initially OBEX was designed for infrared, latterly
now has been adopted by BLUETOOTH also used
over USB.
REQUIREMENTS
• A BLUETOOTH enabled cell phone.
• A place with a lot of people having their
BLUETOOTH device switched on.
HOW TO BLUEJACK
• Discover an area with a good number of mobile users
as restro , mall, railway station, bank, classroom, etc.
• Create a new contact in our phonebook of our cell
phone named something surprising as “Hey, you
have been Bluejacked” or “Virus Received”
• Search for the available BLUETOOTH in your range
to send the saved contact.
• The receiver is thereby distinguished by message tone
or by discovering the owner’s facial expression.
USAGE OF BLUEJACKING
•
•
•
•
•

Shopping mall
Train station
Cinema hall
Café/ Pub
Classroom
CODE OF ETHICS
•
•
•
•
•

Do not hack any device.
Do not send any abusive messages.
Do not threaten anyone.
Must not reveal yourself to the victim.
Do disable Bluetooth if you don’t want to be
BLUEJACKED.
RELATED CONCEPTS
• BLUESNARFING
• BLUEBUGGING
BLUESNARFING
• Stealing of information from victim’s Bluetooth
device often between phone, laptops, PDA’s , etc.
• This allows access to a calendar, contact list, emails
and sms and moreover some user can steal even
images and private videos.
BLUEBUGGING
• Form of Bluetooth Attack.
• Allows user to take control of a victim’s phone to call
the user’s phone and can even send messages.
• Mechanism is being carried out using Laptop, with
the use of powerful PDAs and mobile devices.
MEASURES/PREVENTIONS
• TURN OFF BLUETOOTH device until when not in
use.
• Set the BLUETOOTH device to HIDDEN mode.
CONCLUSION
BLUEJACKING is a technique by which we can
interact with a new person and can bring a great change
in the world of advertisement by sending about the
products , enterprises etc. on the Bluetooth.
So we conclude that in future this technology becomes
the key for advertisement to interact with the world.
REFRENCES
• http://en.wikipedia.org/wiki/Bluejacking
• http://www.seminarsonly.com/computer%20s
cience/Bluejacking.php
• http://www.slideshare.net
• http://electronics.howstuffworks.com/bluejac
king.htm
THANK YOU. . .
QUESTIONS ?

Weitere ähnliche Inhalte

Was ist angesagt?

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
Sadhana28
 

Was ist angesagt? (20)

Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
Blue eyes seminar report
Blue eyes seminar reportBlue eyes seminar report
Blue eyes seminar report
 
Daknet Technology
Daknet TechnologyDaknet Technology
Daknet Technology
 

Andere mochten auch

School management system
School management systemSchool management system
School management system
Soumya Behera
 
Student database management system
Student database management systemStudent database management system
Student database management system
Snehal Raut
 

Andere mochten auch (13)

Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
 
College management-system
College management-systemCollege management-system
College management-system
 
Intel core i7 processor
Intel core i7 processorIntel core i7 processor
Intel core i7 processor
 
Intel Core i7 Processors
Intel Core i7 ProcessorsIntel Core i7 Processors
Intel Core i7 Processors
 
School management system
School management systemSchool management system
School management system
 
Pill camera presentation
Pill camera presentationPill camera presentation
Pill camera presentation
 
Pill camera
Pill cameraPill camera
Pill camera
 
Student database management system
Student database management systemStudent database management system
Student database management system
 
School Management System
School Management SystemSchool Management System
School Management System
 
School Management System ppt
School Management System pptSchool Management System ppt
School Management System ppt
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie My seminar on bluejacking

amrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdfamrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdf
amrapalibuildersreviews
 
A Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless DomainA Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless Domain
ijtsrd
 

Ähnlich wie My seminar on bluejacking (20)

SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devices
 
Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
amrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdfamrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdf
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
A Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless DomainA Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless Domain
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Mehr von Akshita Pillai

Monster Blood,GOOSEBUMPS
Monster Blood,GOOSEBUMPSMonster Blood,GOOSEBUMPS
Monster Blood,GOOSEBUMPS
Akshita Pillai
 
American sign language
American sign languageAmerican sign language
American sign language
Akshita Pillai
 

Mehr von Akshita Pillai (6)

Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
Ransomware
RansomwareRansomware
Ransomware
 
Piggybacking
PiggybackingPiggybacking
Piggybacking
 
Poke-Yoke or Mistake-proofing
Poke-Yoke or Mistake-proofingPoke-Yoke or Mistake-proofing
Poke-Yoke or Mistake-proofing
 
Monster Blood,GOOSEBUMPS
Monster Blood,GOOSEBUMPSMonster Blood,GOOSEBUMPS
Monster Blood,GOOSEBUMPS
 
American sign language
American sign languageAmerican sign language
American sign language
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

My seminar on bluejacking

  • 1. SEMINAR ON BLUEJACKING GUIDED BY: Dr. V.K.PATLE SWARNIMA SHRIVASTAVA SUBMITTED BYAKSHITA PILLAI MCA 2nd SEM
  • 2. OUTLINES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. INTRODUCTION BLUEJACKING CAN BE DONE IN.. TECHNOLOGY USED BLUETOOTH TECHNOLOGY OBEX PROTOCOL REQUIREMENTS HOW TO BLUEJACK? USAGE OF BLUEJACKING CODE OF ETHICS CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING PREVENTIONS CONCLUSIONS
  • 3. INTRODUCTION • Bluejacking is sending of unsolicited message over Bluetooth to Bluetooth-Enabled devices such as mobile phone, PDA or Laptops, by sending a vCard which typically contain a message in the name field via OBEX protocol. • Bluejacking do not remove or alter any data from the device. • The person who is being attacked does not know any information about the hacker except the name assigned to the hacker’s mobile phone.
  • 4. BLUEJACKING CAN BE DONE IN DEVICES LIKE LAPTOP MOBILE COMPUTER PDA(personal digital assistant)
  • 5. TECHNOLOGY USED • BLUETOOTH TECHNOLOGY. • OBEX protocol.
  • 6. BLUETOOTH TECHNOLGY • Short private area that uses radio frequencies to transmit data. • Has a very limited range , usually 10 meters on mobile phones and around 100 meters on laptops. • Connects various devices alike laptop , camera, mobile, mouse, etc. in a PAN (Personal Area Network). • Low power. • Low cost.
  • 7. EXAMPLE OF BLUETOOTH TECH. ALL ARE BLUETOOTH ENABLED DEVICES Map automatically CELL PHONE CAR COMPUTER Sent to pc Cell phone picked up Bluetooth signal from pc & automatically sent the data you want to transfer to computer after 5 mins. Home phone picked up the Bluetooth signal from your cell phone & automatically re-routed the call FRIEND CALLS YOU HOME PHONE RINGS
  • 8. OBEX PROTOCOL • OBEX (abbreviation of Object Exchange) is a communication protocol that facilitates the exchange of binary objects between devices. • Helps to exchange business card , data , even applications. • Initially OBEX was designed for infrared, latterly now has been adopted by BLUETOOTH also used over USB.
  • 9. REQUIREMENTS • A BLUETOOTH enabled cell phone. • A place with a lot of people having their BLUETOOTH device switched on.
  • 10. HOW TO BLUEJACK • Discover an area with a good number of mobile users as restro , mall, railway station, bank, classroom, etc. • Create a new contact in our phonebook of our cell phone named something surprising as “Hey, you have been Bluejacked” or “Virus Received” • Search for the available BLUETOOTH in your range to send the saved contact. • The receiver is thereby distinguished by message tone or by discovering the owner’s facial expression.
  • 11. USAGE OF BLUEJACKING • • • • • Shopping mall Train station Cinema hall Café/ Pub Classroom
  • 12. CODE OF ETHICS • • • • • Do not hack any device. Do not send any abusive messages. Do not threaten anyone. Must not reveal yourself to the victim. Do disable Bluetooth if you don’t want to be BLUEJACKED.
  • 14. BLUESNARFING • Stealing of information from victim’s Bluetooth device often between phone, laptops, PDA’s , etc. • This allows access to a calendar, contact list, emails and sms and moreover some user can steal even images and private videos.
  • 15. BLUEBUGGING • Form of Bluetooth Attack. • Allows user to take control of a victim’s phone to call the user’s phone and can even send messages. • Mechanism is being carried out using Laptop, with the use of powerful PDAs and mobile devices.
  • 16. MEASURES/PREVENTIONS • TURN OFF BLUETOOTH device until when not in use. • Set the BLUETOOTH device to HIDDEN mode.
  • 17. CONCLUSION BLUEJACKING is a technique by which we can interact with a new person and can bring a great change in the world of advertisement by sending about the products , enterprises etc. on the Bluetooth. So we conclude that in future this technology becomes the key for advertisement to interact with the world.
  • 18. REFRENCES • http://en.wikipedia.org/wiki/Bluejacking • http://www.seminarsonly.com/computer%20s cience/Bluejacking.php • http://www.slideshare.net • http://electronics.howstuffworks.com/bluejac king.htm