SlideShare una empresa de Scribd logo
1 de 14
Presented By
A. Mercy
S. Asvitha
(II B.Sc.[CS])
Introduction
 “Ajack” posted a comment on a mobile phone
forum.
 Ajack told IT Web that he used his Ericsson
cell phone in a bank to send a message to
someone with a Nokia 7650.
 Ajack did a Bluetooth discovery to see if there
was another Bluetooth device around.
Discovering a Nokia 7650, he created a new
contact and filled in the first name with ‘Buy
Ericsson! and sent a business card to the Nokia
phone.
To make sure that Bluetooth is enabled.
To read the handbook of the particular phone (or
PDA etc).
Phone or PDA will start to search the airwaves
for other devices within range.
To see a list of them appear, or it will say that it
cannot find any.
First press the 5way joystick down
Then choose "New
contact"
Then press done

Then choose options
Then in the first
line choose your
desired message
Then go to the contact

Then press options

Then choose "Via
Bluetooth"
Then select & send
your message

Then scroll down to
send
Then the phone will
search for enabled
Devices.
software tools
Blue spam:
Blue spam:
Searches for all discoverable Bluetooth devices.
Searches for all discoverable Bluetooth devices.
Sends aafile to them if they support OBEX.
Sends file to them if they support OBEX.

Meeting point:
Meeting point:
Perfect tool to search for bluetooth devices.
Perfect tool to search for bluetooth devices.
This software is compatible with pocket pc, windows.
This software is compatible with pocket pc, windows.

Free jack:
Free jack:
Compatible to java phone like Nokia N-series.
Compatible to java phone like Nokia N-series.

Easy jacking (eJack):
Easy jacking (eJack):
devices.
devices.

Allows sending of text Messages to other Bluetooth enabled
Allows sending of text Messages to other Bluetooth enabled
Usage Of Bluejacking









SY
BU ING
P
OP E R
SH N T
CE

Busy shopping centre
Railway Station
Café/ restaurant/ pub
On a train/ tube/ bus
High Street
Cinema
Mobile phone shop
Electronics shop

y
lw a
Rai tion
Sta

/
afé nt/
C
ura
st a b
re pu

/
rain
at
On e / b u s
tub

Hi

re
h St
g

et
Architecture
Piconet:

• The devices find each other and form a network called
“ piconet ” spontaneously.

• A piconet is a basic unit with up to 8 nodes.
• All communication are between master and slaves.
• Master controls clock and decides the time slot for the
device.

• In a piconet , there can be up to 255 parked nodes.
(i) Bluejacker - who carry out the bluejack.
(ii) Victim – Who receive the bluejack.
Code of Ethics

 Don't send abusive messages.
 Don't threaten anyone.
 Don't put your personal information in a Blue Jack message.
 Don't reveal yourself to the 'victim'.
 Do disable Bluetooth if you don't want to be Blue Jacked.
Related Concepts
Related Concepts

Bluesnarfing:


The theft of information form a wireless device through a Bluetooth
connection.

This allows access to a calendar, contact list, emails and text
messages.

Bluesnarfing is much more serious in relation to ‘Blue jacking’.

Bluecasting:


Provision of any small digital media to suitable media provisioning
devices over Bluetooth via the OBEX protocol.

Bluebugging:




Blue bugging is a form of Bluetooth attack.
Allows the user to take control of a victim’s
phone to call the user’s phone

enabled
Earlier issue:
Promotes an environment that puts consumer devices at greater risk.

Complete memory contents of some mobile phones can be accessed
by a previously trusted paired device.

Phonebook and calendar can be obtained without owner’s
knowledge.


Present Scenario:
Primarily occurs in public spaces.

Security issues previously involved with blue jacking has been
resolved.

In order for information to be duplicated, the devices would have to
be paired. Bluejacking does not require a password to be entered
and therefore the two devices are not paired.

Control Measures:
 Turn off your Bluetooth device when not in use.

Warning:

 Never try to ‘hack’ a device.
 Is an offence under the “computer misuse act
1990”.
Conclusion

 Blue jacking is a technique by which
we can interact with new people.
 It has ability to bring a revolution
market by sending advertisement.
Queries?

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
How to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhoneHow to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhone
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhone
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 

Destacado

Presentation on Paper battery
Presentation on Paper battery Presentation on Paper battery
Presentation on Paper battery manish katara
 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project pptLishita Shah
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete pptatinav242
 
The Physical Interface
The Physical InterfaceThe Physical Interface
The Physical InterfaceJosh Clark
 
wireless power transmission(SPS)
wireless power transmission(SPS)wireless power transmission(SPS)
wireless power transmission(SPS)Er. Rahul kumar
 
new punit wireless
new punit wirelessnew punit wireless
new punit wirelessPunit Jangir
 
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSIONLASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSIONMadhusudan Sharma
 
Smart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + SocialSmart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + SocialRomin Irani
 
Exterminator: Automatically Correcting Memory Errors with High Probability
Exterminator: Automatically Correcting Memory Errors with High ProbabilityExterminator: Automatically Correcting Memory Errors with High Probability
Exterminator: Automatically Correcting Memory Errors with High ProbabilityEmery Berger
 
Global Pico Projector Market Forecast & Opportunities, 2019
Global Pico Projector Market Forecast & Opportunities, 2019Global Pico Projector Market Forecast & Opportunities, 2019
Global Pico Projector Market Forecast & Opportunities, 2019TechSci Research
 
Intra Oral Camera Camrex 192
Intra Oral Camera Camrex 192 Intra Oral Camera Camrex 192
Intra Oral Camera Camrex 192 Chromadnet
 
Wireless HDMI: a quick-and-dirty guide
Wireless HDMI: a quick-and-dirty guideWireless HDMI: a quick-and-dirty guide
Wireless HDMI: a quick-and-dirty guideAirtame
 
WIRELESS POWER TRANSMISSION
WIRELESS POWER TRANSMISSIONWIRELESS POWER TRANSMISSION
WIRELESS POWER TRANSMISSIONDevesh Bhatnagar
 
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...Atlassian
 
Seguridad Informatica: Pishing
Seguridad Informatica: PishingSeguridad Informatica: Pishing
Seguridad Informatica: Pishingmelanie hernandez
 

Destacado (20)

Paper battery
Paper batteryPaper battery
Paper battery
 
artificial eye
artificial eyeartificial eye
artificial eye
 
Presentation on Paper battery
Presentation on Paper battery Presentation on Paper battery
Presentation on Paper battery
 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project ppt
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 
The Physical Interface
The Physical InterfaceThe Physical Interface
The Physical Interface
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
wireless power transmission(SPS)
wireless power transmission(SPS)wireless power transmission(SPS)
wireless power transmission(SPS)
 
The New Gsm based Neos
The New Gsm based NeosThe New Gsm based Neos
The New Gsm based Neos
 
new punit wireless
new punit wirelessnew punit wireless
new punit wireless
 
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSIONLASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
LASER FUSION REACTOR, FUSION HYBRID, COLD FUSION
 
Smart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + SocialSmart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + Social
 
Exterminator: Automatically Correcting Memory Errors with High Probability
Exterminator: Automatically Correcting Memory Errors with High ProbabilityExterminator: Automatically Correcting Memory Errors with High Probability
Exterminator: Automatically Correcting Memory Errors with High Probability
 
Global Pico Projector Market Forecast & Opportunities, 2019
Global Pico Projector Market Forecast & Opportunities, 2019Global Pico Projector Market Forecast & Opportunities, 2019
Global Pico Projector Market Forecast & Opportunities, 2019
 
Intra Oral Camera Camrex 192
Intra Oral Camera Camrex 192 Intra Oral Camera Camrex 192
Intra Oral Camera Camrex 192
 
Wireless HDMI: a quick-and-dirty guide
Wireless HDMI: a quick-and-dirty guideWireless HDMI: a quick-and-dirty guide
Wireless HDMI: a quick-and-dirty guide
 
WIRELESS POWER TRANSMISSION
WIRELESS POWER TRANSMISSIONWIRELESS POWER TRANSMISSION
WIRELESS POWER TRANSMISSION
 
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
Sprinting Ahead – How RunKeeper Uses Atlassian Tools in a Fast-Paced Agile Wo...
 
Seguridad Informatica: Pishing
Seguridad Informatica: PishingSeguridad Informatica: Pishing
Seguridad Informatica: Pishing
 

Similar a Blue jacking mercy

Similar a Blue jacking mercy (17)

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Blutooth technology
Blutooth technologyBlutooth technology
Blutooth technology
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Communication devices
Communication devicesCommunication devices
Communication devices
 

Último

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Último (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Blue jacking mercy

  • 1. Presented By A. Mercy S. Asvitha (II B.Sc.[CS])
  • 3.  “Ajack” posted a comment on a mobile phone forum.  Ajack told IT Web that he used his Ericsson cell phone in a bank to send a message to someone with a Nokia 7650.  Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650, he created a new contact and filled in the first name with ‘Buy Ericsson! and sent a business card to the Nokia phone.
  • 4. To make sure that Bluetooth is enabled. To read the handbook of the particular phone (or PDA etc). Phone or PDA will start to search the airwaves for other devices within range. To see a list of them appear, or it will say that it cannot find any.
  • 5. First press the 5way joystick down Then choose "New contact" Then press done Then choose options Then in the first line choose your desired message Then go to the contact Then press options Then choose "Via Bluetooth" Then select & send your message Then scroll down to send Then the phone will search for enabled Devices.
  • 6. software tools Blue spam: Blue spam: Searches for all discoverable Bluetooth devices. Searches for all discoverable Bluetooth devices. Sends aafile to them if they support OBEX. Sends file to them if they support OBEX. Meeting point: Meeting point: Perfect tool to search for bluetooth devices. Perfect tool to search for bluetooth devices. This software is compatible with pocket pc, windows. This software is compatible with pocket pc, windows. Free jack: Free jack: Compatible to java phone like Nokia N-series. Compatible to java phone like Nokia N-series. Easy jacking (eJack): Easy jacking (eJack): devices. devices. Allows sending of text Messages to other Bluetooth enabled Allows sending of text Messages to other Bluetooth enabled
  • 7. Usage Of Bluejacking         SY BU ING P OP E R SH N T CE Busy shopping centre Railway Station Café/ restaurant/ pub On a train/ tube/ bus High Street Cinema Mobile phone shop Electronics shop y lw a Rai tion Sta / afé nt/ C ura st a b re pu / rain at On e / b u s tub Hi re h St g et
  • 8. Architecture Piconet: • The devices find each other and form a network called “ piconet ” spontaneously. • A piconet is a basic unit with up to 8 nodes. • All communication are between master and slaves. • Master controls clock and decides the time slot for the device. • In a piconet , there can be up to 255 parked nodes. (i) Bluejacker - who carry out the bluejack. (ii) Victim – Who receive the bluejack.
  • 9. Code of Ethics  Don't send abusive messages.  Don't threaten anyone.  Don't put your personal information in a Blue Jack message.  Don't reveal yourself to the 'victim'.  Do disable Bluetooth if you don't want to be Blue Jacked.
  • 10. Related Concepts Related Concepts Bluesnarfing:  The theft of information form a wireless device through a Bluetooth connection.  This allows access to a calendar, contact list, emails and text messages.  Bluesnarfing is much more serious in relation to ‘Blue jacking’. Bluecasting:  Provision of any small digital media to suitable media provisioning devices over Bluetooth via the OBEX protocol. Bluebugging:   Blue bugging is a form of Bluetooth attack. Allows the user to take control of a victim’s phone to call the user’s phone enabled
  • 11. Earlier issue: Promotes an environment that puts consumer devices at greater risk.  Complete memory contents of some mobile phones can be accessed by a previously trusted paired device.  Phonebook and calendar can be obtained without owner’s knowledge.  Present Scenario: Primarily occurs in public spaces.  Security issues previously involved with blue jacking has been resolved.  In order for information to be duplicated, the devices would have to be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired. 
  • 12. Control Measures:  Turn off your Bluetooth device when not in use. Warning:  Never try to ‘hack’ a device.  Is an offence under the “computer misuse act 1990”.
  • 13. Conclusion  Blue jacking is a technique by which we can interact with new people.  It has ability to bring a revolution market by sending advertisement.