3. INTRODUCTION
• Bluejacking is sending of unsolicited message
over Bluetooth to Bluetooth-Enabled devices such
as mobile phone, PDA or Laptops, by sending a
vCard which typically contain a message in the
name field via OBEX protocol.
• Bluejacking do not remove or alter any data from
the device.
• The person who is being attacked does not know
any information about the hacker except the name
assigned to the hacker’s mobile phone.
4. BLUEJACKING CAN BE DONE IN
DEVICES LIKE
LAPTOP
MOBILE
COMPUTER
PDA(personal digital assistant)
6. BLUETOOTH TECHNOLGY
• Short private area that uses radio frequencies to
transmit data.
• Has a very limited range , usually 10 meters on
mobile phones and around 100 meters on laptops.
• Connects
various
devices
alike
laptop
, camera, mobile, mouse, etc. in a PAN (Personal
Area Network).
• Low power.
• Low cost.
7. EXAMPLE OF BLUETOOTH TECH.
ALL ARE BLUETOOTH ENABLED DEVICES
Map automatically
CELL
PHONE
CAR
COMPUTER
Sent to pc
Cell phone picked up
Bluetooth signal from pc
& automatically sent the
data you want to transfer
to computer
after 5 mins.
Home phone picked up
the Bluetooth signal from
your cell phone &
automatically re-routed
the call
FRIEND
CALLS YOU
HOME PHONE
RINGS
8. OBEX PROTOCOL
• OBEX (abbreviation of Object Exchange) is a
communication protocol that facilitates the exchange
of binary objects between devices.
• Helps to exchange business card , data , even
applications.
• Initially OBEX was designed for infrared, latterly
now has been adopted by BLUETOOTH also used
over USB.
9. REQUIREMENTS
• A BLUETOOTH enabled cell phone.
• A place with a lot of people having their
BLUETOOTH device switched on.
10. HOW TO BLUEJACK
• Discover an area with a good number of mobile users
as restro , mall, railway station, bank, classroom, etc.
• Create a new contact in our phonebook of our cell
phone named something surprising as “Hey, you
have been Bluejacked” or “Virus Received”
• Search for the available BLUETOOTH in your range
to send the saved contact.
• The receiver is thereby distinguished by message tone
or by discovering the owner’s facial expression.
12. CODE OF ETHICS
•
•
•
•
•
Do not hack any device.
Do not send any abusive messages.
Do not threaten anyone.
Must not reveal yourself to the victim.
Do disable Bluetooth if you don’t want to be
BLUEJACKED.
14. BLUESNARFING
• Stealing of information from victim’s Bluetooth
device often between phone, laptops, PDA’s , etc.
• This allows access to a calendar, contact list, emails
and sms and moreover some user can steal even
images and private videos.
15. BLUEBUGGING
• Form of Bluetooth Attack.
• Allows user to take control of a victim’s phone to call
the user’s phone and can even send messages.
• Mechanism is being carried out using Laptop, with
the use of powerful PDAs and mobile devices.
17. CONCLUSION
BLUEJACKING is a technique by which we can
interact with a new person and can bring a great change
in the world of advertisement by sending about the
products , enterprises etc. on the Bluetooth.
So we conclude that in future this technology becomes
the key for advertisement to interact with the world.