SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Vi hang shah
Blue Jacking
Introduction
Blue Jacking is technique of sending text message between devices that connected with
Bluetooth. Blue jacking also allow sending multimedia content from one device to another
devices. The range of sending content within 10 meters and there is no charge of it because
it is connected with Bluetooth and its free.
Blue jacking sounds like hijacking means Bluetooth hijacking, but a bluejacker never hijacks
anything. Both parties remain in absolute control over their devices, and a bluejacker will
not be able to take over your phone or steal your personal information.
How to blue jack?
1. Go to address book and create a new contact.
2. When creating the contact, enter the message you wish to blue jack into the
contact name part.
3. Save the contact.
4. Long press on contact and choose via send card Bluetooth.
5. Search for Bluetooth device within your range.
6. Select the device which you want to connect.
7. And send the contact to that device via Bluetooth
8. You will get the message “card sent” and then listen for the sms message
tone of your victim’s phone.
How to prevent form blue jacking?
1. Setting the Bluetooth on the right mode
Adjust the setting of Bluetooth to non-discoverable mode. The non-
discoverable mode hides the device from attackers or unknown people
Vi hang shah
2. Factory reset of the phone
If your device was perpetrated at some point, it means that attacker’s device
has been already been added as a trusted device on your phone.
3. Keep away from strangers
Make it decline any message or connection request from unknown device.
Most attack happen due to accepting connection request from stranger who
then gets added as trusted devices.
4. Putting of the Bluetooth when it has no use
If you don’t use the Bluetooth frequently, keep it off to avoid your device
from being listed in the sender’s device search list.
5. Set password for Bluetooth
Software Tools for blue jacking
Blue spam
Meeting point
Freejack
Easyjacking

Weitere ähnliche Inhalte

Was ist angesagt?

My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
Akshita Pillai
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
Sadhana28
 

Was ist angesagt? (20)

Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
How to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhoneHow to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhone
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhone
 

Andere mochten auch

Nokia morph technology
Nokia morph technologyNokia morph technology
Nokia morph technology
Kummari Sanjay
 
6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry
rrrattlingrajeev
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
Rohit Gupta
 

Andere mochten auch (20)

Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]
 
easy to way swallow wireless telemetry
easy to way swallow wireless telemetryeasy to way swallow wireless telemetry
easy to way swallow wireless telemetry
 
Light fidelity(Li Fi)
Light fidelity(Li Fi)Light fidelity(Li Fi)
Light fidelity(Li Fi)
 
Documentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software DevelopmentDocumentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software Development
 
Li fi doc
Li fi docLi fi doc
Li fi doc
 
Presentation on Femtocell technology
Presentation on Femtocell technologyPresentation on Femtocell technology
Presentation on Femtocell technology
 
Nokia morph technology
Nokia morph technologyNokia morph technology
Nokia morph technology
 
6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry
 
Smartquill
SmartquillSmartquill
Smartquill
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
 
Light Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar ReportLight Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar Report
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
 
FemtoCell
FemtoCellFemtoCell
FemtoCell
 
Nokia morph
Nokia morphNokia morph
Nokia morph
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
Smartquill
SmartquillSmartquill
Smartquill
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
 

Ähnlich wie Blue Jacking

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
Adam Varn
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
Guneet Pahwa
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
smilichitti
 

Ähnlich wie Blue Jacking (17)

Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Le security v0.8
Le security v0.8Le security v0.8
Le security v0.8
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdf
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Blue Jacking

  • 1. Vi hang shah Blue Jacking Introduction Blue Jacking is technique of sending text message between devices that connected with Bluetooth. Blue jacking also allow sending multimedia content from one device to another devices. The range of sending content within 10 meters and there is no charge of it because it is connected with Bluetooth and its free. Blue jacking sounds like hijacking means Bluetooth hijacking, but a bluejacker never hijacks anything. Both parties remain in absolute control over their devices, and a bluejacker will not be able to take over your phone or steal your personal information. How to blue jack? 1. Go to address book and create a new contact. 2. When creating the contact, enter the message you wish to blue jack into the contact name part. 3. Save the contact. 4. Long press on contact and choose via send card Bluetooth. 5. Search for Bluetooth device within your range. 6. Select the device which you want to connect. 7. And send the contact to that device via Bluetooth 8. You will get the message “card sent” and then listen for the sms message tone of your victim’s phone. How to prevent form blue jacking? 1. Setting the Bluetooth on the right mode Adjust the setting of Bluetooth to non-discoverable mode. The non- discoverable mode hides the device from attackers or unknown people
  • 2. Vi hang shah 2. Factory reset of the phone If your device was perpetrated at some point, it means that attacker’s device has been already been added as a trusted device on your phone. 3. Keep away from strangers Make it decline any message or connection request from unknown device. Most attack happen due to accepting connection request from stranger who then gets added as trusted devices. 4. Putting of the Bluetooth when it has no use If you don’t use the Bluetooth frequently, keep it off to avoid your device from being listed in the sender’s device search list. 5. Set password for Bluetooth Software Tools for blue jacking Blue spam Meeting point Freejack Easyjacking