SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Vi hang shah
Blue Jacking
Introduction
Blue Jacking is technique of sending text message between devices that connected with
Bluetooth. Blue jacking also allow sending multimedia content from one device to another
devices. The range of sending content within 10 meters and there is no charge of it because
it is connected with Bluetooth and its free.
Blue jacking sounds like hijacking means Bluetooth hijacking, but a bluejacker never hijacks
anything. Both parties remain in absolute control over their devices, and a bluejacker will
not be able to take over your phone or steal your personal information.
How to blue jack?
1. Go to address book and create a new contact.
2. When creating the contact, enter the message you wish to blue jack into the
contact name part.
3. Save the contact.
4. Long press on contact and choose via send card Bluetooth.
5. Search for Bluetooth device within your range.
6. Select the device which you want to connect.
7. And send the contact to that device via Bluetooth
8. You will get the message “card sent” and then listen for the sms message
tone of your victim’s phone.
How to prevent form blue jacking?
1. Setting the Bluetooth on the right mode
Adjust the setting of Bluetooth to non-discoverable mode. The non-
discoverable mode hides the device from attackers or unknown people
Vi hang shah
2. Factory reset of the phone
If your device was perpetrated at some point, it means that attacker’s device
has been already been added as a trusted device on your phone.
3. Keep away from strangers
Make it decline any message or connection request from unknown device.
Most attack happen due to accepting connection request from stranger who
then gets added as trusted devices.
4. Putting of the Bluetooth when it has no use
If you don’t use the Bluetooth frequently, keep it off to avoid your device
from being listed in the sender’s device search list.
5. Set password for Bluetooth
Software Tools for blue jacking
Blue spam
Meeting point
Freejack
Easyjacking

Más contenido relacionado

La actualidad más candente (20)

Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
How to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhoneHow to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhone
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhone
 

Destacado

Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]Mayank Tripathi
 
easy to way swallow wireless telemetry
easy to way swallow wireless telemetryeasy to way swallow wireless telemetry
easy to way swallow wireless telemetrymohammed shahid
 
Light fidelity(Li Fi)
Light fidelity(Li Fi)Light fidelity(Li Fi)
Light fidelity(Li Fi)Sumedh Saraf
 
Documentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software DevelopmentDocumentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software DevelopmentFabian Kiss
 
Presentation on Femtocell technology
Presentation on Femtocell technologyPresentation on Femtocell technology
Presentation on Femtocell technologyvijay rastogi
 
Nokia morph technology
Nokia morph technologyNokia morph technology
Nokia morph technologyKummari Sanjay
 
6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistryrrrattlingrajeev
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract documentRohith Palakurthi
 
6th sense technology
6th sense technology6th sense technology
6th sense technologyRohit Gupta
 
Light Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar ReportLight Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar ReportShamil Niju
 
6th sense technology
6th sense technology6th sense technology
6th sense technologyStudent
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communicationHimanshu Singh
 

Destacado (20)

Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]Rejuvenation of wireless technology [li fi]
Rejuvenation of wireless technology [li fi]
 
easy to way swallow wireless telemetry
easy to way swallow wireless telemetryeasy to way swallow wireless telemetry
easy to way swallow wireless telemetry
 
Light fidelity(Li Fi)
Light fidelity(Li Fi)Light fidelity(Li Fi)
Light fidelity(Li Fi)
 
Documentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software DevelopmentDocumentation for Program Comprehension in Agile Software Development
Documentation for Program Comprehension in Agile Software Development
 
Li fi doc
Li fi docLi fi doc
Li fi doc
 
Presentation on Femtocell technology
Presentation on Femtocell technologyPresentation on Femtocell technology
Presentation on Femtocell technology
 
Nokia morph technology
Nokia morph technologyNokia morph technology
Nokia morph technology
 
6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry6th Sense Project by Pranav Mistry
6th Sense Project by Pranav Mistry
 
Smartquill
SmartquillSmartquill
Smartquill
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
 
Light Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar ReportLight Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar Report
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
 
FemtoCell
FemtoCellFemtoCell
FemtoCell
 
Nokia morph
Nokia morphNokia morph
Nokia morph
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
Smartquill
SmartquillSmartquill
Smartquill
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
 

Similar a Blue Jacking

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdam Varn
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxshanofa sanu
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone SecurityGuneet Pahwa
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdfsmilichitti
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdfSherozkhan15
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hackingdiv2345
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 

Similar a Blue Jacking (17)

Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Le security v0.8
Le security v0.8Le security v0.8
Le security v0.8
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Mobile Device Best Practices.pdf
Mobile Device Best Practices.pdfMobile Device Best Practices.pdf
Mobile Device Best Practices.pdf
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Blue Jacking

  • 1. Vi hang shah Blue Jacking Introduction Blue Jacking is technique of sending text message between devices that connected with Bluetooth. Blue jacking also allow sending multimedia content from one device to another devices. The range of sending content within 10 meters and there is no charge of it because it is connected with Bluetooth and its free. Blue jacking sounds like hijacking means Bluetooth hijacking, but a bluejacker never hijacks anything. Both parties remain in absolute control over their devices, and a bluejacker will not be able to take over your phone or steal your personal information. How to blue jack? 1. Go to address book and create a new contact. 2. When creating the contact, enter the message you wish to blue jack into the contact name part. 3. Save the contact. 4. Long press on contact and choose via send card Bluetooth. 5. Search for Bluetooth device within your range. 6. Select the device which you want to connect. 7. And send the contact to that device via Bluetooth 8. You will get the message “card sent” and then listen for the sms message tone of your victim’s phone. How to prevent form blue jacking? 1. Setting the Bluetooth on the right mode Adjust the setting of Bluetooth to non-discoverable mode. The non- discoverable mode hides the device from attackers or unknown people
  • 2. Vi hang shah 2. Factory reset of the phone If your device was perpetrated at some point, it means that attacker’s device has been already been added as a trusted device on your phone. 3. Keep away from strangers Make it decline any message or connection request from unknown device. Most attack happen due to accepting connection request from stranger who then gets added as trusted devices. 4. Putting of the Bluetooth when it has no use If you don’t use the Bluetooth frequently, keep it off to avoid your device from being listed in the sender’s device search list. 5. Set password for Bluetooth Software Tools for blue jacking Blue spam Meeting point Freejack Easyjacking