Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

BLUE JACKING

Abstract
 Bluejacking is the sending of unsolicited messages over bluetooth to bluetooth-enabled
devices such as mobile phones, laptop computers, PDAs.

 This technology allows mobile phone users to send business cards anonymously using
bluetooth wireless technology.

 Bluejacking is also known as Bluehacking.

http://1.bp.blogspot.com/ZGfR6MujmlI/UJjvDI4kuyI/
AAAAAAAAAOg/cwrXwbOfdmQ/s1600/bluejackin
g.gif
Introduction
 Bluejacking is an attack conducted on Bluetooth-enabled devices like mobile phones, laptops,
computers, PDAs.
 Bluetooth has a very limited range.
 Bluejacking also mean for sending a Vcard via the OBEX protocol.

Laptop Mobile Phone Computer


OBEX Protocol
 OBJECT EXCHANGE is a transfer protocol that defines data object and a communication
protocol for devices that can exchange data and commands in a resource-sensitive
standardized fashion.

 This technology works over bluetooth and Infrared Data Association(IrDA) protocols. OBEX
is primarily used as a push or pull application. The typical example could be an object push of
business cards to someone else.

 It performs a function that is similar to Hypertext Transfer Protocol(HTTP) but it does not
require the resources that an HTTP server requires making it perfect for low-end devices with
limited resources.
What is Bluetooth?
 Bluetooth is defined as a wireless technology that
provides short range communications.

 Bluetooth consists of very limited range usually


around 10 meters for mobile phones, but for
laptops it can reach upto 100 meters with
powerful transmitters.

 Bluetooth is for synchronizing emails, sending


messages, or connecting to remote headsets.

https://darbi.org/wpcontent/uploads/2017/05/bluet
ooth-technology.gif
How to Bluejack?
 Bluetooth devices only work over short distances, so we need to find a big crowd.
 Create a new contact in phone book .
 Press done/Ok option. Save this new contact.
 Then click on the contact created. Go to action choose “via Bluetooth” or “send to
Bluetooth” option.
 Click the “search” option for discovering active bluetooth devices and select a device
from the list.
 After the selection of the particular device, the short message would be transmitted to it.
Thus, the device would be Bluejacked.
How does the sender send the bluejack message.

What does the receiver see on the screen as he


receives the bluejack message.
Software tools
 Blue spam : Searches for all discoverable bluetooth device and sends a file to
them if they support OBEX protocol.

 Free jack : Compatible to java phones like Nokia N-series.

 E-jack : Allows sending of text messages to other bluetooth enabled devices.

 Meeting point : Perfect tool to search for bluetooth devices. This software is compatible
with pocket pc, windows.
Places where bluejacking occurs
Attacks of Bluejacking
 Bluesnarfing

 Bluecasting

 Bluebugging
Bluesnarfing
 In this, the attacker gets unauthorised access to the information
on a wireless device through a bluetooth connection. The
wireless devices can be mobile phones, desktops, laptops and
Personal Digital Assistant (PDAs).

 Once the attacker gains access, he can have access to the


victim’s calendars, contact lists, emails and text messages. Not
only that but also they can copy user pictures and private
videos.

 Bluesnarfing can also be done even if your device is hidden.


Blue casting
 Provision of any small digital media to suitable media provisioning enabled devices over
bluetooth via the OBEX protocol.
Bluebugging
 Bluebugging is a hacking technique that allows individuals to access a device with a
discoverable bluetooth connection.

 Allows the user to take control of a victim’s phone to call the user’s phone.

 It is similar to phone eavesdropping or bugging.


Usage of Bluejacking
 Busy shopping centre
 Railway Station
 Café/ Restaurant
Busy shopping centre Railway Station
 High Street
 Cinema
 Mobile phone shop
 Electronic shop

Café/Restaurant High Street


Advantages of Bluejacking
 Usually, a bluejacker will best ship a text message, however with modern phones it is possible
to send images or sounds as well.

 We can easily transfer files from mobile to laptop or from mobile to mobile in a short duration.

 We can even enjoy music by wireless headphones via bluejacking.


Disadvantages of Bluejacking
 Due to growth in the availability of bluetooth enabled gadgets, those devices have end up
prone to virus attacks and complete takeover of devices via a bug software.

 Those virus pruned devices can even cause irritation in any man or woman as these are
unwelcomed messages or a few jokes.

 They can annoy absolutely everyone without any difficulty.


Applications
 Viral Communication

 Community activities

 Location based services


Prevention
 Setting the bluetooth on the right mode

 Factory reset of the phone

 Keep away from strangers

 Putting off the bluetooth when it has no use

 Set password for bluetooth


Security Issues
 Security Mode-1: In this mode the device does not
implement any security procedures, and allows any other
device to initiate connections with it.

 Security Mode-2: Security is enforced after the link is


established, allowing higher level applications to run more
flexible security policies.

 Security Mode-3: Security controls such as authentication


and encryption are implemented at the baseband level before
the connection is established. Bluetooth allows different
security levels to be defined for devices and services.
Conclusion
 In conclusion, Bluejacking is not all harmful. By using it, we can interact with new people.
The only thing it can do at worst is to irritate you by sending unsolicited messages by
changing the visibility of your bluetooth to invisible or non-discoverable mode.

 It has an ability to bring a revolutionerise market by sending advertisement about the


product, enterprise etc., on the Bluetooth configured mobile phone so that the people get
aware about them by seeing them on the phone.

 It can be helpful as well by providing you with lots of useful information. So, use this
technology properly as it is intended to, rather than just making wrong use of it.
References
 Bluejacking by Jonatha Samuel, First Edition: 1997 by Tata McGraw Hill.

 bluejackQ.com Index Archived October 5, 2006 at Wayback Machine.

 http://en.Wikipedia.org/wiki/Bluejackin

 http://www.howstuffworks.com/bluejacking.htm
Thank You

You might also like