0% found this document useful (0 votes)
362 views20 pages

Bluejacking (PP, P4)

Bluejacking involves sending unsolicited messages to Bluetooth-enabled devices. It exploits the Bluetooth feature that allows discovery and connection between devices within range of each other. Bluejacking originated after an IT consultant named Ajack demonstrated sending messages to Ericsson cellphones. It uses Bluetooth technology, vCards to send messages, and the OBEX protocol. The document discusses the process, software tools, usage scenarios, merits and demerits of bluejacking.

Uploaded by

Harshada Koli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
362 views20 pages

Bluejacking (PP, P4)

Bluejacking involves sending unsolicited messages to Bluetooth-enabled devices. It exploits the Bluetooth feature that allows discovery and connection between devices within range of each other. Bluejacking originated after an IT consultant named Ajack demonstrated sending messages to Ericsson cellphones. It uses Bluetooth technology, vCards to send messages, and the OBEX protocol. The document discusses the process, software tools, usage scenarios, merits and demerits of bluejacking.

Uploaded by

Harshada Koli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

BLUEJACKING

Guided by: Presented by:


PROF. SONALI GANGURDE HARSHADA KOLI
(Student of 3rd Year C.M)
11/14/2019
2
CONTENTS
 Introduction to Bluejacking
 Origin of Bluejacking
 Technology Used
 Requirements
 Architecture of Bluejacking
 Process of Bluejacking
 Software tools for Bluejacking
 Usage of Bluejacking
 Merits and Demerits
 Related Concepts
 Code of Ethics
 Future Aspects
 Conclusion
11/14/2019
3
WHAT IS BLUEJACKING
TECHNOLOGY??
Sending of unsolicited messages over Bluetooth to
Bluetooth-enabled devices.
Exploits a basic Bluetooth feature

11/14/2019
4
ORIGIN OF BLUEJACKING

Started after a Malaysian IT consultant named “Ajack”

Ajack told about Ericsson cellphone

Ajack did a Bluetooth discovery

11/14/2019
5
TECHNOLOGY USED

Bluetooth Technology
vCards
OBEX Protocol

11/14/2019
6
BLUETOOTH TECHNOLOGY

Wireless Technology
Connects numerous devices
Distance of data transmission is small
Eradicates use of cords, cables, adapters
Communication is done via RF link
Ability to be full duplex and handle both data and
voice transmission simultaneously
11/14/2019
7
VCARDS

Also known as VCF


File format standard
Electronic business card
Can contain name and address information, telephone
numbers, email addresses etc.
Used as data interchange format

11/14/2019
8
OBEX PROTOCOL

Stands for Object Exchange

Protocol for wireless exchange of data

Built in various different kinds of hardware

Session layer protocol


11/14/2019
9
REQUIREMENTS

Bluetooth enabled cell phone


People in crowded places having their Bluetooth
device switched on

11/14/2019
10 ARCHITECTURE OF BLUEJACKING

Pinocet
• Device find each other and form a network
• Pinocet is a basic unit with upto 8 nodes
• All communication between master and slaves
• Pinocet is a centralized TDM system

11/14/2019
11
PINOCETS

11/14/2019
12
PROCESS OF BLUEJACKING

Go to contacts in the phone book or address book


Create a new contact
Enter the message into the name part
Save the new contact
Choose “send via bluetooth”
Choose one phone and send the contact
You will get the message “card sent” and then listen for
the SMS message tone of your victim’s phone

11/14/2019
13
SOFTWARE TOOLS FOR
BLUEJACKING
Bluespam
Meeting Point
Freejack
Easyjacking
Proximitymail

11/14/2019
14
USAGE

 Busy Shopping Centres


 Starbucks
 Train Station
 High Street
 On a train/bus
 Cinema
 Café/restaurant/pub
 Mobile phone shop
 Electronics shop(eg. Dixons)
11/14/2019
15
MERITS & DEMERITS

 Merits:
• People can send any image or sound
• Easy transfer of data in a short period
• Can enjoy music by wireless headphone
 Demerits:
• Bluejacking confused with bluesnarfing
• Virus attacks
• Definitely doesn’t work on blueberry, iPhones or iPads

11/14/2019
16
RELATED CONCEPTS

Bluesnarfing: Unauthorised access of information from a


wireless device through a bluetooth connection

Bluecasting: Physical server provisioning the digital


media over Bluetooth to interested devices

Bluebugging: Form of Bluetooth attack

11/14/2019
17
CODE OF ETHICS

Do not hack any device


Do not send abusive messages
Don’t threaten anyone
Don’t put your personal information in a bluejack
message
Don’t reveal yourself to the victim
Do disable bluetooth if you don’t want to be
bluejacked 11/14/2019
18
FUTURE ASPECTS

Act as major sale tool


Because of its low cost and power consumption this
technology has a great future ahead
Learn future preferences by placing options like “more
ads like this” and “less ads like this” in each
advertisement.

11/14/2019
19
CONCLUSION

Because of its low cost and power consumption this


technology has a great future ahead
Can easily transfer the data on the spot in fraction of
seconds without using cardreaders etc.

11/14/2019
20

THANK YOU…

11/14/2019

You might also like