0% found this document useful (0 votes)
69 views12 pages

Blue Jacking

This document discusses bluejacking, which is sending unsolicited messages to Bluetooth-enabled devices. It describes how bluejacking works, including enabling Bluetooth, discovering other devices, and sending a vCard message. It provides examples of software tools used for bluejacking and discusses ethics and safety considerations for the practice.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views12 pages

Blue Jacking

This document discusses bluejacking, which is sending unsolicited messages to Bluetooth-enabled devices. It describes how bluejacking works, including enabling Bluetooth, discovering other devices, and sending a vCard message. It provides examples of software tools used for bluejacking and discusses ethics and safety considerations for the practice.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

BLUE JACKING

Group -3
20-472. - B.Sai Tejaswini
20-474. - B.Sneha
20-476. - Manasa
20-482 - Praditha
20-484. - Vineela
Introduction

• Sending of unsolicited messages over Bluetooth to


Bluetooth – Enabled devices
• Bluetooth has a very limited range
• Bluejacking also mean for sending a Vcard via the
OBEX protocol.

LAPTOP MOBILE
PDA COMPUTER COMPUTER
ORIGIN
1. “AJACK” posted a comment on a mobile phone
forum.
2. AJACK told IT web that he used his Ericsson cell
phone in a bank to send a message to someone
with a NOKIA 7650.
3. AJACK did a Bluetooth discovery to see if there
was another Bluetooth device around.
4. Discovering a NOKIA 7650,he created a new
contact and filled in the first name with ‘Buy
Ericsson!’ and sent a business card to the NOKIA
phone.
HOW TO BLUEJACK

• To make sure that Bluetooth is enabled.


• To read the handbook of the particular phone or
PDA etc.
• Phone or PDA will start to search the airwaves for
other devices within range.
• To see a list of them appear ,or it will say that it
cannot find any.
THE VARIOUS STEPS INVOLVED –IN MOBILE
SOFTWARE TOOLS:

BLUE SPAM :
Searches for all discoverable Bluetooth devices.Sends a file to them
if they support OBEX.
MEETING POINT:
Perfect tool to search for Bluetooth devices.This Software is
compatible with pocket PC , windows.
FREE JACK:
Compatible in Java phone like NOKIA N-series
EASY JACKING(eJack):
Allows sending of text Messages to other Bluetooth enabled devices .
USAGE OF BLUEJACKING

• Busy Shopping Centre


• RAILWAY STATION
• CAFÉ/RESTAURANT/PUB
• On a train/ bus
• High street
• Cinema
• Mobile Phone shop
• Electronics shop
CODE OF ETHICS

• Don’t send abusive messages


• Don’t threaten anyone
• Don’t put your personal information in a BLUE JACK Message.
• Don’t reveal yourself to the ‘ victim’.
• Do disable BLUETOOTH if you don’t want to be BLUE JACK ed.
BLUETOOTH HACKING TYPES

Blue snarfing:
The theft of information form a wireless device through a
Bluetooth connection.
Bluecasting:
Provision of any small digital media to suitable media
provisioning devices over Bluetooth via the OBeX protocol.
Bluebugging:
Blue bugging is a form of Bluetooth attack.
CONTROL MEASURES AND WARNINGS

• Turn 📴 your Bluetooth device when not 🚫 in use.


• Never try to hack a device .
• Is an offence under the “Computer misuse act 1990”.
CONCLUSION :

• Blue jacking is a technique by which we can


interact with new people.
• It has ability to bring a revolution market by
sending advertisement.
THANK YOU

You might also like