0% found this document useful (0 votes)
274 views25 pages

Seminar On Bluejacking

This document discusses bluejacking, which is sending unsolicited messages to Bluetooth devices. It provides an introduction to bluejacking, a brief history of how it started, and describes the underlying Bluetooth and OBEX protocol technology. It also outlines how to perform bluejacking using mobile phones or laptops, common places it occurs, ethics, and prevention methods like turning off Bluetooth when not in use.

Uploaded by

Vasanthi Ravuri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
274 views25 pages

Seminar On Bluejacking

This document discusses bluejacking, which is sending unsolicited messages to Bluetooth devices. It provides an introduction to bluejacking, a brief history of how it started, and describes the underlying Bluetooth and OBEX protocol technology. It also outlines how to perform bluejacking using mobile phones or laptops, common places it occurs, ethics, and prevention methods like turning off Bluetooth when not in use.

Uploaded by

Vasanthi Ravuri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

SEMINAR

ON
BLUEJACKING

P R E S E N T E D B Y:
VA S A N T H I R AV U R I
188T1A05A0
CONTENTS
 Introduction Of Bluejacking
 History
 Bluejacking Technology
 Architecture
 Technical Features
 Classification
 How Bluejacking Can Be Done???
 Software Tools
 Usage Of Bluejacking
 Places Where Bluejacking Occurs
 Code Of Ethics
 Prevention
 Conclusion
 References
INTRODUCTION OF BLUEJACKING

BLUEJACKING:
Bluejacking is the sending of unsolicited messages over
Bluetooth to Bluetooth-enabled devices such as mobile phones,
PDAs or laptop computers, sending a vCard which typically
contains a message in the name field to another Bluetooth-enabled
device via the OBEX protocol.
HISTORY
 This bluejack phenomenon started after a Malaysian IT
consultant named “Ajack” posted a comment on mobile phone
forum.
 Ajack told IT Web that he used his Ericsson cellphone in a bank
to send a message to someone with a Noika 7650. Becoming
bored while standing in a bank queue Overview.
BLUEJACKING TECHNOLOGY

 Bluetooth Technology
 vCard
 OBEX Protocol
What is Bluetooth?
 Bluetooth is defined as a wireless technology that provides short-range
communications without connecting to any wires.
 Bluetooth has a very limited range, usually around 10 meters(32.8 ft) on
mobile phones, but laptops can reach up to 100 meters(328 ft) with powerful
transmitters.
vCard
 vCard(Versitcard) or vcf is a electronic file format that stores the
contact information.
 vCard’s are often attached to e-mail messages, but can be
exchanged in other ways, such as on the World Wide Web.
 They can contain name and address information, phone numbers,
URLs, logos, photographs, and even audio clips.
OBEX Protocol
 OBEX -- OBject EXchange
 It is a communication protocol that facilitates the exchange of
binary objects between devices.
 This technology works over Bluetooth and Infrared Data
Association(IrDA) protocols.
 OBEX is primarily used as push or pull applications.
ARCHITECTURE
PICONET:
 The two Bluetooth devices found each other and form a network called “Piconet”.
 A piconet is a basic unit that can be formed by 8 nodes; one of which is the master node and
upto seven active slave nodes within a maximum distance of 10 meters.
 Communication can take place between a master node and a slave node in either one-to-one
or one-to-many manner. There is no direct communication takes place between slaves.
 Each station, whether master or slave, is associated with a 48-bit fixed device address.
 Besides the seven active slaves, there can be up to 255 numbers of parked nodes. These are
in a low power state for energy conservation.
TECHNICAL FEATURES
CLASSIFICATION
 Classification of devices based on the basis of Power dissipated &
corresponding maximum Range.
On Mobile
 Go to Contacts.
 Create a new contact.
 Write the short note in name.
 Save this contact.
 Select this contact and send via Bluetooth.
 Your phone will search for devices.
 All the Bluetooth devices near you will be displayed.
 Select any one you like and send.
 You have bluejacked someone.
On Personal Computer/Laptop
 Go to contacts in your Address Book program (e.g. Outlook).
 Create a new contact.
 Enter the message into one of the 'name' fields.
 Save the new contact.
 Go to the address book.
 Right-click on the message/contact.
 Go to action
 Go to Send to Bluetooth.
 Click on other.
 Select a device from the list and double click on it.
SOFTWARE TOOLS

 Bluespam
 Meeting Point
 Free Jack
 E-Jack
Bluespam:-
Bluespam searches for all discoverable Bluetooth devices and sends a file to them if
they support OBEX.

Meeting Point:-
Meeting point is the perfect tools to search for Bluetooth devices. Combine it with
any bluejacking tools and have lots of fun. This software is compatible with pocket PC,
Windows.

Freejack:-
Freejack is compatible to java phone like Nokia N-series.

Easyjacking (eJack):-
Allows sending of text Messages to other Bluetooth enables devices.
USAGE OF BLUEJACKING

o Busy shopping centre


o Starbucks
o Train Station
o High Street
o On a train/bus
o Cinema
o Cafe/ restaurant/ pub
o Mobile phone shop
o Electronics shop
Places where bluejacking occurs
Code Of Ethics
 Don’t send abusive messages.
 Don’t threaten anyone.
 Don’t put your personal information in a Bluejack message.
 Don’t reveal yourself to the ‘victim’.
 Do disable Bluetooth if you don’t want to be bluejacked.
PREVENTION
 There is hardly any software available to prevent or detect bluejacking.
 Turn off Bluetooth when not in use.
 Don’t put device in discoverable and connectable mode.
CONCLUSION
Bluejacking is not at all harmful. By it, we can
interact with new people. The only thing it can do at worst
is to irritate you or annoy you by sending unsolicited
messages, but you can still prevent yourselves from these
messages by changing the visibility of your Bluetooth to
invisible or non-discoverable mode.
REFERENCES

 https://en.wikipedia.org/wiki/Bluejacking
 http://www.bluejackq.com/
 https://www.seminarsonly.com/computer%20science/Bluejacking.php
 https://studymafia.org/bluejacking-seminar-pdf-report-with-ppt/
 https://www.seminarppt.in/2013/09/bluejacking.html

You might also like