0% found this document useful (0 votes)
643 views28 pages

Bluejacking

The document discusses a seminar presentation on bluejacking. Bluejacking involves sending unsolicited messages to Bluetooth devices using the OBEX protocol. The presentation covers the technology behind bluejacking including Bluetooth, vCards, and the OBEX protocol. It also discusses how to bluejack using various software tools, potential uses of bluejacking, related concepts like bluesnarfing and bluecasting, security issues, and counters to bluejacking like turning off Bluetooth when not in use.

Uploaded by

Sumaiya Kauser
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
643 views28 pages

Bluejacking

The document discusses a seminar presentation on bluejacking. Bluejacking involves sending unsolicited messages to Bluetooth devices using the OBEX protocol. The presentation covers the technology behind bluejacking including Bluetooth, vCards, and the OBEX protocol. It also discusses how to bluejack using various software tools, potential uses of bluejacking, related concepts like bluesnarfing and bluecasting, security issues, and counters to bluejacking like turning off Bluetooth when not in use.

Uploaded by

Sumaiya Kauser
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Seminar

On
Bluejacking

PRESENTED BY: UNDER THE GUIDANCE OF:


MD AYAZ ALI
Content
 Introduction
 Bluejacking Technology
 Architecture
 Technical Features
 How to Bluejack
 Usage of bluejacking
 Related concepts
 Future aspects
 Conclusion
 Reference
Introduction
• Bluejacking
– Sending of unsolicited messages over Bluetooth to
Bluetooth-enabled devices such as mobile phones,
PDAs or laptop computers via the OBEX protocol.

• Origin
– Started after a Malaysian IT consultant named “Ajack”
posted a comment on a mobile phone forum.
Bluejacking Technology
 Bluetooth technology
 vCard
 OBEX protocol
Continued….
• Short range wireless LAN
• Connects numerous devices of different functions like telephones,
notebooks, computers, digital cameras etc. , in Personal Area Network
(PAN).

• Three areas - Data and Voice access points, Cable replacement, and Ad hoc
networking.

• Supports point - to - point as well as multi-point.


• Low power
• Low cost single chip radio – feasible
Architecture
Piconet

• The devices find each other and form a network called “


piconet ” spontaneously.
• A piconet is a basic unit with up to 8 nodes, one of which is a
master and up to seven active slave nodes within a maximum
distance of 10 meters.
• All communication between master and slaves.
• Piconet is a centralized TDM system.
• Master controls clock and decides the time slot for the device.
• In a piconet , there can be up to 255 parked nodes.
• Master switches to low power state and parked node wait for
beacon from master.
Technical Features
Spread Spectrum (Frequency
Connection Type Hopping) & Time Division Duplex
(1600 hops/sec)
2.4 GHz ISM Open Band (79 MHz of
Spectrum
spectrum = 79 channels)
Modulation Gaussian Frequency Shift Keying
Transmission Power 1 mw – 100 mw
Data Rate 1 Mbps
Range 30 ft
Supported Stations 8 devices
Data Security –Authentication
128 bit key
Key
Data Security –Encryption Key 8-128 bits (configurable)
Module size 9 x 9 mm
Classification
 Classification of devices on the basis of Power
dissipated & corresponding maximum Range.

POWER RANGE

CLASS I 20 dBm 100 m


CLASS II 0-4 dBm 10 m
CLASS III 0 dBm 1m
How to Bluejack
• Mobile
• Personal computers
• Software tools
– Bluespam
• Searches for all discoverable Bluetooth devices and sends a
file to them (spam's them) if they support OBEX.
• By default a small text will be send.
Continued….
 Customize the message that should be send you need a
palm with an SD/MMC card, then you create the
directory /PALM/programs/BlueSpam/ Send/ and put
the file you would like to in into this directory. Activity
is logged to /PALM/programs/BlueSpam/Log/log.txt.

› Mobiluck
Continued….

› Meeting point
 Is compatible with pocket PC, palm, Windows.

› Proximity mail

› Easyjack

› Freejack
 Freejack is compatible to java phone like Nokia N-
series.
Usage of bluejacking
 Busy shopping centre
 Starbucks
 Train Station
 High Street
 On a train/ tube/ bus
 Cinema
 Café/ restaurant/ pub
 Mobile phone shop
 Electronics shop (e.g. Dixons)
Places where bluejack occurs

Home

Cafés

Bars

Places where bluejack occures

Restaurants

Stores ans shopping malls

Public transportation

0 5 10 15 20 25 30 35
Continued…

 Advertisement
 Marketing opportunity
› Viral communication

› Community activities

› Location based service


Code of ethics
Do not hack any device
Don't send abusive messages
Don't threaten anyone
Don't put your personal information in a BlueJack message
Don't reveal yourself to the 'victim'
Do disable Bluetooth if you don't want to be BlueJacked
Related concepts
 Bluesnarfing
 Bluecasting
 Bluebugging
Bluesnarfing
 Is the unauthorized access of information from a
wireless device through a Bluetooth connection,
often between phones, desktops, laptops, and
PDAs.
 Even if your device is hidden bluesnarfing can
also be done.
Bluecasting
 Provision of any small digital media to suitable
media provisioning enabled devices over
Bluetooth via the OBEX protocol.
Bluebugging
 Form of Bluetooth attack.
 Allows the user to take control of a victim's
phone to call the user's phone.
Security issues
Earlier issue
Promotes an environment that puts consumer devices

at greater risk.
Complete memory contents of some mobile phones

can be accessed by a previously trusted paired device.


Phonebook and calendar can be obtained without

owners knowledge.
Present Scenario
 primarily occurs in public spaces

 Security issues previously involved with bluejacking

has been resolved.


 In order for information to be duplicated, the devices would
have to be paired. Bluejacking does not require a password
to be entered and therefore the two devices are not paired
Counters-measures
 Turn off your Bluetooth device until you need to
communicate with another user.
 Buy an E2X bag.
› It blocks all transmissions and receiving signals from
leaving the bag.
Future aspects
 Act as major sale tool
 learn user preferences by placing options like
"more ads like this" and "less ads like this" in
each advertisement.
Conclusion
 Because of its low cost and power consumption
this technology has a great future ahead.
Reference

 www.google.com
 www.wikipedia.com
 www.studymafia.org
Thanks
Queries?

You might also like