Professional Documents
Culture Documents
Blue Jacking
Blue Jacking
Abstract
Bluejacking is the sending of unsolicited messages over bluetooth to bluetooth-enabled
devices such as mobile phones, laptop computers, PDAs.
This technology allows mobile phone users to send business cards anonymously using
bluetooth wireless technology.
http://1.bp.blogspot.com/ZGfR6MujmlI/UJjvDI4kuyI/
AAAAAAAAAOg/cwrXwbOfdmQ/s1600/bluejackin
g.gif
Introduction
Bluejacking is an attack conducted on Bluetooth-enabled devices like mobile phones, laptops,
computers, PDAs.
Bluetooth has a very limited range.
Bluejacking also mean for sending a Vcard via the OBEX protocol.
This technology works over bluetooth and Infrared Data Association(IrDA) protocols. OBEX
is primarily used as a push or pull application. The typical example could be an object push of
business cards to someone else.
It performs a function that is similar to Hypertext Transfer Protocol(HTTP) but it does not
require the resources that an HTTP server requires making it perfect for low-end devices with
limited resources.
What is Bluetooth?
Bluetooth is defined as a wireless technology that
provides short range communications.
https://darbi.org/wpcontent/uploads/2017/05/bluet
ooth-technology.gif
How to Bluejack?
Bluetooth devices only work over short distances, so we need to find a big crowd.
Create a new contact in phone book .
Press done/Ok option. Save this new contact.
Then click on the contact created. Go to action choose “via Bluetooth” or “send to
Bluetooth” option.
Click the “search” option for discovering active bluetooth devices and select a device
from the list.
After the selection of the particular device, the short message would be transmitted to it.
Thus, the device would be Bluejacked.
How does the sender send the bluejack message.
Meeting point : Perfect tool to search for bluetooth devices. This software is compatible
with pocket pc, windows.
Places where bluejacking occurs
Attacks of Bluejacking
Bluesnarfing
Bluecasting
Bluebugging
Bluesnarfing
In this, the attacker gets unauthorised access to the information
on a wireless device through a bluetooth connection. The
wireless devices can be mobile phones, desktops, laptops and
Personal Digital Assistant (PDAs).
Allows the user to take control of a victim’s phone to call the user’s phone.
We can easily transfer files from mobile to laptop or from mobile to mobile in a short duration.
Those virus pruned devices can even cause irritation in any man or woman as these are
unwelcomed messages or a few jokes.
Community activities
It can be helpful as well by providing you with lots of useful information. So, use this
technology properly as it is intended to, rather than just making wrong use of it.
References
Bluejacking by Jonatha Samuel, First Edition: 1997 by Tata McGraw Hill.
http://en.Wikipedia.org/wiki/Bluejackin
http://www.howstuffworks.com/bluejacking.htm
Thank You