SlideShare a Scribd company logo
1 of 22
What is
bluejacking
 Bluejacking is the sending of
  unsolicited messages over Bluetooth
  to Bluetooth-enabled devices such as
  mobile phones, PDAs or laptop
  computers,etc.

 Bluetooth has a very limited range;
  usually around 10 meters on mobile
  phones, but laptops can reach up to
  100 meters with powerful
  transmitters.
Origin of Bluejacking
 This bluejack phenomenon started after a Malaysian IT
  consultant named “Ajack” posted a comment on a mobile
  phone forum.

 Ajack told IT Web that he used his Ericsson cellphone in a
 bank to send a message to someone with a Nokia 7650.

 Ajack did a Bluetooth discovery to see if there was another
  Bluetooth device around. Discovering a Nokia 7650 in the
  vicinity, he created a new contact and filled in the first name
  with ‘Buy Ericsson!' and sent a business card to the Nokia
  phone.
How to Bluejack
 Assuming that you now have a
  Bluetooth phone in your
  hands, the first thing to do is
  to make sure that Bluetooth is
  enabled. You will need to read
  the handbook of the particular
  phone (or PDA etc) that you
  have but somewhere in the
  Menu item you will find the
  item that enables and disabled
  Bluetooth.
How to Bluejack
 Your phone or PDA will start to search the airwaves for other devices
  within range.
 If you are lucky you will see a list of them appear, or it will say that it
  cannot find any.




 If the latter happens then relocate to another crowd or wait a while
  and try again.
 If you have a list of found devices then let the fun begin.
The various steps involved – in mobile
   1. First press the 5-way joystick down.
   2. Then choose options.
   3. Then choose "New contact"
   4. Then in the first line choose your desired
    message.
   5. Then press done.
   6. Then go to the contact.
   7. Then press options.
   8. Then scroll down to send.
   9. Then choose "Via Bluetooth"
   10. Then the phone will be searching for enabled
    Devices.
   11. Then press "Select"
The various steps involved – in
 computer/laptop
 1. Go to contacts in your Address
  Book program (e.g. Outlook)
 2. Create a new contact
 3. Enter the message into one of the
  'name' fields
 4. Save the new contact
 5. Go to the address book
 6. Right-click on the message/contact
 7. Go to action
 8. Go to Send to Bluetooth
 9. Click on other
 10. Select a device from the list and
  double click on it
Software Tools
• Bluespam: BlueSpam searches for all
  discoverable Bluetooth devices and sends a
  file to them (spams them) if they support
  OBEX.
• Meeting point: Meeting point is the perfect
  tools to search for Bluetooth devices. Combine
  it with any bluejacking tools and have lots of
  fun. This software is compatible with pocket
  PC, Windows.
• Freejack: Freejack is compatible to java
  phone like Nokia N-series
• Easyjacking (eJack): Allows sending of text
  Messages to other Bluetooth enables devices.
Usage of Bluejacking
 Bluejacking can be used in many fields
  and for various purposes like in the busy
  shopping centre,train station, high
  street,cinema,café/restaurant/pub,etc.

 The main use of bluejacking tools or
  bluejacking is in advertising purpose and
  location based purpose.

     Experimental results show that the
    system provides a viable solution for
    realizing    permission-based  mobile
    advertising.
Now remember that
bluetooth works only for
short range of distances, so
you need to find the
crowd. Bluejacking is very
new so not everyone will
have a bluetooth phone or
a PDA(Personal Digital
Assistant) so the bigger
crowd the more likely you
will find a “victim” on the
train, in the cafe        or
standing in line are all
good places to start……
Bluejackers often look for the receiving phone to
ping or the user to react. In order to carry out a
bluejacking,




the sending and receiving devices must be within
10 meters of one another.
Code of Ethics
• Bluejackers will only send messages/pictures. They will never
  try to 'hack' a device for the purpose of copying or modifying
  any files on any device or upload any executable files.

• Any such messages or pictures sent will not be of an insulting,
  libelous or vulgure in nature and will be copyright free or
  copyrighted by the sender.

• If no interest is shown by the recipient after 2 messages the
  bluejacker will desist and move on.
Code of Ethics
• The bluejacker will restrict their
  activity to 10 messages maximum
  unless in exceptional circumstances

• If the Bluejacker senses that he/she is
  causing distress rather than mirth to
  the recipient they will immediately
  decease all activity towards them.

•    If a bluejacker is caught 'in the act'
    he/she will be as co-operative as
    possible and not hide any details of
    their activity.
Related Concepts
               BlueSnarfing :
    “Bluesnarfing” is the term
    associated with downloading any
    and all information from a
    hacked device. Bluesnarfing is
    the theft of information from a
    wireless device through a
    Bluetooth connection, often
    between phones, desktops,
    laptops, and PDAs. This allows
    access to a calendar, contact list,
    emails and text messages.
    Bluesnarfing is much more
    serious in relation to Bluejacking
Related Concepts
Bluebugging: Bluebugging
 is a form of Bluetooth attack. In
 progression of discovery date,
 Bluetooth attack started with
 bluejacking, then bluesnarfing, and
 then      bluebugging.     Bluebug
 program allows the user to take
 control of a victim's phone to call
 the user's phone. This means that
 the Bluebug user can simply listen
 to any conversation his victim is
 having in real life.
How to Prevent Being
Bluejacked
      To prevent being
 Bluejacked,      disable
 Bluetooth     on     the
 mobile device when
 not in use. The device
 will not show up on a
 “Bluejacker’s” phone
 when he/she attempts
 to send a message and
 they do not queue up.
Good Practices for Bluetooth Enabled
Devices
    Whether someone is unwilling to partake in Bluejacking or just
    does not want to be bothered with these messages, the following
    are some good practices to consider:
   Do not reveal an identity when either sending or receiving
    Bluejacked messages.
   Never threaten anyone.
   Never send messages that can be considered abusive.
   Never reveal personal information in response to a Bluejacked
    message.
   Disable Blue Tooth option if not in use in order to prevent
    Bluejacked messages.
   If a Bluejacking message is received, delete the message voice
    accepting it or it will be added to the device’s address book.
Warning
• Never try to 'hack' a device
  for the purpose of copying or
  modifying any files on any
  device or upload any
  executable files. By hacking a
  device you are committing an
  offence under the computer
  misuse act 1990, which
  states it is an offence to
  obtain unauthorized access to
  any computer
Conclusion
  Bluejacking is a technique by which we can interact
with new people and has ability to revolutionerise
market by sending advertisement about the product,
enterprise etc. on the Bluetooth configured mobile
phone so that the people get aware about them by
seeing them on the phone.
Thank

More Related Content

What's hot (20)

My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
 
Gi-Fi ppt
Gi-Fi pptGi-Fi ppt
Gi-Fi ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Seminar report on blue eyes
Seminar report on blue eyesSeminar report on blue eyes
Seminar report on blue eyes
 
Blue eyes technology..document (1)
Blue eyes technology..document (1)Blue eyes technology..document (1)
Blue eyes technology..document (1)
 
Sandbox
SandboxSandbox
Sandbox
 

Viewers also liked (18)

Bluejacking
BluejackingBluejacking
Bluejacking
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 
Space mouse
Space mouseSpace mouse
Space mouse
 
5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT
 
ERP
ERPERP
ERP
 
Femtocell
FemtocellFemtocell
Femtocell
 
ppt on femtocell
ppt on femtocellppt on femtocell
ppt on femtocell
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
3D-Doctor
3D-Doctor3D-Doctor
3D-Doctor
 
Wi vi ppt
Wi vi pptWi vi ppt
Wi vi ppt
 
Energy Saving fan .ppt
Energy Saving   fan .ppt Energy Saving   fan .ppt
Energy Saving fan .ppt
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPT
 
Space Mouse
Space MouseSpace Mouse
Space Mouse
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Military Radar
Military RadarMilitary Radar
Military Radar
 
Soft computing
Soft computingSoft computing
Soft computing
 

Similar to Bluejacking

Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docxShravani Patil
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxshanofa sanu
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdfsmilichitti
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentationali100
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdfSherozkhan15
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdam Varn
 

Similar to Bluejacking (18)

Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
 
SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentation
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdf
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Bluejacking

  • 1.
  • 2. What is bluejacking  Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,etc.  Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
  • 3. Origin of Bluejacking  This bluejack phenomenon started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.  Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia 7650.  Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650 in the vicinity, he created a new contact and filled in the first name with ‘Buy Ericsson!' and sent a business card to the Nokia phone.
  • 4. How to Bluejack  Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled. You will need to read the handbook of the particular phone (or PDA etc) that you have but somewhere in the Menu item you will find the item that enables and disabled Bluetooth.
  • 5. How to Bluejack  Your phone or PDA will start to search the airwaves for other devices within range.  If you are lucky you will see a list of them appear, or it will say that it cannot find any.  If the latter happens then relocate to another crowd or wait a while and try again.  If you have a list of found devices then let the fun begin.
  • 6.
  • 7. The various steps involved – in mobile  1. First press the 5-way joystick down.  2. Then choose options.  3. Then choose "New contact"  4. Then in the first line choose your desired message.  5. Then press done.  6. Then go to the contact.  7. Then press options.  8. Then scroll down to send.  9. Then choose "Via Bluetooth"  10. Then the phone will be searching for enabled Devices.  11. Then press "Select"
  • 8. The various steps involved – in computer/laptop  1. Go to contacts in your Address Book program (e.g. Outlook)  2. Create a new contact  3. Enter the message into one of the 'name' fields  4. Save the new contact  5. Go to the address book  6. Right-click on the message/contact  7. Go to action  8. Go to Send to Bluetooth  9. Click on other  10. Select a device from the list and double click on it
  • 9.
  • 10. Software Tools • Bluespam: BlueSpam searches for all discoverable Bluetooth devices and sends a file to them (spams them) if they support OBEX. • Meeting point: Meeting point is the perfect tools to search for Bluetooth devices. Combine it with any bluejacking tools and have lots of fun. This software is compatible with pocket PC, Windows. • Freejack: Freejack is compatible to java phone like Nokia N-series • Easyjacking (eJack): Allows sending of text Messages to other Bluetooth enables devices.
  • 11. Usage of Bluejacking  Bluejacking can be used in many fields and for various purposes like in the busy shopping centre,train station, high street,cinema,café/restaurant/pub,etc.  The main use of bluejacking tools or bluejacking is in advertising purpose and location based purpose.  Experimental results show that the system provides a viable solution for realizing permission-based mobile advertising.
  • 12. Now remember that bluetooth works only for short range of distances, so you need to find the crowd. Bluejacking is very new so not everyone will have a bluetooth phone or a PDA(Personal Digital Assistant) so the bigger crowd the more likely you will find a “victim” on the train, in the cafe or standing in line are all good places to start……
  • 13. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another.
  • 14. Code of Ethics • Bluejackers will only send messages/pictures. They will never try to 'hack' a device for the purpose of copying or modifying any files on any device or upload any executable files. • Any such messages or pictures sent will not be of an insulting, libelous or vulgure in nature and will be copyright free or copyrighted by the sender. • If no interest is shown by the recipient after 2 messages the bluejacker will desist and move on.
  • 15. Code of Ethics • The bluejacker will restrict their activity to 10 messages maximum unless in exceptional circumstances • If the Bluejacker senses that he/she is causing distress rather than mirth to the recipient they will immediately decease all activity towards them. • If a bluejacker is caught 'in the act' he/she will be as co-operative as possible and not hide any details of their activity.
  • 16. Related Concepts  BlueSnarfing : “Bluesnarfing” is the term associated with downloading any and all information from a hacked device. Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to Bluejacking
  • 17. Related Concepts Bluebugging: Bluebugging is a form of Bluetooth attack. In progression of discovery date, Bluetooth attack started with bluejacking, then bluesnarfing, and then bluebugging. Bluebug program allows the user to take control of a victim's phone to call the user's phone. This means that the Bluebug user can simply listen to any conversation his victim is having in real life.
  • 18. How to Prevent Being Bluejacked To prevent being Bluejacked, disable Bluetooth on the mobile device when not in use. The device will not show up on a “Bluejacker’s” phone when he/she attempts to send a message and they do not queue up.
  • 19. Good Practices for Bluetooth Enabled Devices Whether someone is unwilling to partake in Bluejacking or just does not want to be bothered with these messages, the following are some good practices to consider:  Do not reveal an identity when either sending or receiving Bluejacked messages.  Never threaten anyone.  Never send messages that can be considered abusive.  Never reveal personal information in response to a Bluejacked message.  Disable Blue Tooth option if not in use in order to prevent Bluejacked messages.  If a Bluejacking message is received, delete the message voice accepting it or it will be added to the device’s address book.
  • 20. Warning • Never try to 'hack' a device for the purpose of copying or modifying any files on any device or upload any executable files. By hacking a device you are committing an offence under the computer misuse act 1990, which states it is an offence to obtain unauthorized access to any computer
  • 21. Conclusion Bluejacking is a technique by which we can interact with new people and has ability to revolutionerise market by sending advertisement about the product, enterprise etc. on the Bluetooth configured mobile phone so that the people get aware about them by seeing them on the phone.
  • 22. Thank