Bluejacking involves sending unsolicited messages to Bluetooth-enabled devices within Bluetooth range. It has a limited range. It can also send a vCard via the OBEX protocol. An early example involved someone sending a message from their Ericsson phone to a Nokia phone in a bank to advertise Ericsson. Bluejacking tools allow searching for and sending messages to discoverable Bluetooth devices. However, it raises security and privacy issues, and sending abusive messages would be unethical. Later Bluetooth standards have increased security to prevent issues like bluesnarfing from occurring.
Bluejacking involves sending unsolicited messages to Bluetooth-enabled devices within Bluetooth range. It has a limited range. It can also send a vCard via the OBEX protocol. An early example involved someone sending a message from their Ericsson phone to a Nokia phone in a bank to advertise Ericsson. Bluejacking tools allow searching for and sending messages to discoverable Bluetooth devices. However, it raises security and privacy issues, and sending abusive messages would be unethical. Later Bluetooth standards have increased security to prevent issues like bluesnarfing from occurring.
Bluejacking involves sending unsolicited messages to Bluetooth-enabled devices within Bluetooth range. It has a limited range. It can also send a vCard via the OBEX protocol. An early example involved someone sending a message from their Ericsson phone to a Nokia phone in a bank to advertise Ericsson. Bluejacking tools allow searching for and sending messages to discoverable Bluetooth devices. However, it raises security and privacy issues, and sending abusive messages would be unethical. Later Bluetooth standards have increased security to prevent issues like bluesnarfing from occurring.
Basavaraj s Introduction Sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices.
Bluetooth has a very limited range.
Bluejacking also mean for sending a Vcard via
the OBEX protocol.
LAPTOP MOBILE COMPUTER PDA
❖ “Ajack” posted a comment on a mobile phone forum.
❖ Ajack told IT Web that he used his Ericsson
cell phone in a bank to send a message to someone with a Nokia 7650.
❖ Ajack did a Bluetooth discovery to see if there
was another Bluetooth device around. Discovering a Nokia 7650, he created a new contact and filled in the first name with ‘Buy Ericsson! and sent a business card to the Nokia phone. To make sure that Bluetooth is enabled.
To read the handbook of the particular phone (or
PDA etc).
Phone or PDA will start to search the airwaves
for other devices within range.
To see a list of them appear, or it will say that it
cannot find any. First press the 5- STEP1 way joystick down STEP2 Then choose options Then choose "New STEP3 contact" STEP4 Then in the first line choose your desired Then press done STEP5 message STEP6 Then go to the contact Then press options STEP7 STEP8 Then scroll down to send Then choose "Via STEP9 Bluetooth" Then the phone will STEP10 search for enabled Then select & send Devices. your message STEP11 software tools Blue spam: Searches for all discoverable Bluetooth devices. Sends a file to them if they support OBEX. Meeting point: Perfect tool to search for bluetooth devices. This software is compatible with pocket pc, windows. Free jack: Compatible to java phone like Nokia N-series. Easy jacking (eJack): Allows sending of text Messages to other Bluetooth enabled devices. Usage Of Bluejacking Busy shopping centre Railway Station Café/ restaurant/ pub On a train/ tube/ bus High Street Cinema Mobile phone shop Electronics shop Architecture Piconet: • The devices find each other and form a network called “ piconet ” spontaneously. • A piconet is a basic unit with up to 8 nodes. • All communication are between master and slaves. • Master controls clock and decides the time slot for the device. • In a piconet , there can be up to 255 parked nodes. (i) Bluejacker - who carry out the bluejack. (ii) Victim – Who receive the bluejack. Code of Ethics
➢ Don't send abusive messages.
➢ Don't threaten anyone. ➢ Don't put your personal information in a Blue Jack message. ➢ Don't reveal yourself to the 'victim'. ➢ Do disable Bluetooth if you don't want to be Blue Jacked. Related Concepts Bluesnarfing: ✓ The theft of information form a wireless device through a Bluetooth connection. ✓ This allows access to a calendar, contact list, emails and text messages. ✓ Bluesnarfing is much more serious in relation to ‘Blue jacking’. Bluecasting: ✓ Provision of any small digital media to suitable media provisioning enabled devices over Bluetooth via the OBEX protocol.
Bluebugging:
✓ Blue bugging is a form of Bluetooth attack.
✓ Allows the user to take control of a victim’s phone to call the user’s phone Earlier issue: ▪ Promotes an environment that puts consumer devices at greater risk. ▪ Complete memory contents of some mobile phones can be accessed by a previously trusted paired device. ▪ Phonebook and calendar can be obtained without owner’s knowledge.
Present Scenario:
▪ Primarily occurs in public spaces.
▪ Security issues previously involved with blue jacking has been resolved. ▪ In order for information to be duplicated, the devices would have to be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired. Control Measures:
➢ Turn off your Bluetooth device when not in use.
Warning:
➢ Never try to ‘hack’ a device.
➢ Is an offence under the “computer misuse act 1990”. Conclusion