You are on page 1of 22

Bluejacking Technology

By Vandita (CSE/15/324)
Contents

 Introduction
 Bluetooth
 Steps are follows
 Origin
 Software Tools
 Code of Ethics
 Warning
 Conclusion
 References

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Introduction

 Bluejacking is the sending of unsolicited messages over Bluetooth to


Bluetooth-enabled devices.

 UNSOLICITED MESSAGE - Message transmitted in response to a locally


occurring event, rather than an explicit remote request.

 This technology allows mobile phone users to send business cards


anonymously using Bluetooth wireless technology.

 Receiver does not know who has sent the message , but it has the name and
model of the phone used by the bluejacker.

 Bluejacking also mean for sending a vCard which typically contains a message
in the name field(i.e. for bluedating or bluechat) to another Bluetooth enabled
device.
<slide Title> | CONFIDENTIAL 2013 21 April 2019
Bluetooth

 Bluetooth is wireless technology that provides short range communications.

 Bluetooth has a very limited range; usually around 10meters on mobile phones,
but laptops can reach up to100 meters with powerful transmitters.

 Bluetooth is for synchronizing email , sending messages , or connecting to a


remote headset.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Steps are as follows

 Bluetooth devices only work over short distances , so we need to find a big
crowd.
 Now create a new contact in our Phone Book, rather putting some one name
in the name field.
 Press done/ OK option.
 Save this new contact in the phone / address book of mobile phone / laptop
respectively.
 Then click on the Contact created.
 Go to action
 Choose Bluetooth option.
 Change the “Search ”option for discovering active Bluetooth devices
 Select a device from those list.
 After the selection method of the particular device , the short message would
be transmitted to it . Thus the device would be Bluejacked.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Bluejacking can be done by devices like

 Bluejacking is an attack conducted on Bluetooth enabled devices like smart


phones, laptops and PDAs.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Origin

• This bluejack phenomenon started after a Malaysian IT consultant named


“Ajack” posted a comment on a mobile phone forum.

• Ajack told IT Web that he used his Ericsson cell phone in a bank to send a
message to someone with a Nokia7650.

• Ajack did a Bluetooth discovery to see if there was another Bluetooth device
around. Discovering a Nokia7650 in the vicinity, he created a new contact and
filled in the first name with Buy Ericsson! and sent a business card to the Nokia
phone.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


How to Bluejack?

 Assuming that you now have a Bluetooth phone in your hands, the first thing to
do is to make sure that Bluetooth is enabled. You will need to read
the handbook of the particular phone (or PDA etc) that you have but
somewhere in the Menu item you will find the item that enables and disabled
Bluetooth.

 Your phone or PDA will start to search the airwaves for other devices within
range. If you are lucky you will see a list of them appear, or it will say that it
cannot find any. If the latter happens then relocate to another crowd or wait a
while and try again. If you have a list of found devices then let the fun begin

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Prevention

 There is hardly any software available to prevent or detect bluejacking.

 Turn off bluetooth

 Don’t put device in discoverable and connectable area

<slide Title> | CONFIDENTIAL 2013 21 April 2019


The various steps involved in Mobile

<slide Title> | CONFIDENTIAL 2013 21 April 2019


On Mobile

 Go to Contacts.
 Create a new contact.
 Write the short note in name.
 Save this contact.
 Select this contact and send via Bluetooth.
 Your phone will search your devices.
 All the Bluetooth devices near you will be displayed.
 Select any one you like and send.
 You have bluejacked someone.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


The various steps involved in Computer

 Go to contacts in your Address Book program (eg MS Outlook)


 Create a new contact
 Enter the message into one of the 'name' fields
 Save the new contact
 Go to the address book
 Right-click on the message/contact
 Go to action
 Go to Send to Bluetooth
 Click on other
 Select a device from the list and double click on it

<slide Title> | CONFIDENTIAL 2013 21 April 2019


<slide Title> | CONFIDENTIAL 2013 21 April 2019
Software Tools

 There are some softwares to do Bluejacking activities in easier way:-

1. RedFang :- White house has designed a software tool called RedFang which
has discover Bluetooth enabled devices that have been set to be non-
discoverable.

2. Bluesniffer :- Bluesniffer is a simple utility for finding discoverable and


hidden Bluetooth-enabled devices. It operates on Linux and it is a graphical
tool.

3. Bluescanner :- Bluescanner searches out for the Bluetooth-enabled devices


and tries to extract as much information as possible for newly discovered
device.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Bluesnarf

 Bluesnarfing is a method of hacking into a Bluetooth- enabled


mobile phone.

 With this we can copy its entire information like contact book ,
pictures , their data etc..

 This software gives the complete freedom to the hackers , to send


a “corruption code” which all completely shut-down the phone
and make the phone unusable.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Statistical report on Bluejacking tools

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Code of Ethics

 Bluejackers will only send messages or pictures. They will never


try to ‘hack’ a device for the purpose of copying or modifying
any files on any device or upload any executable files.

 If no interest is shown by the recipient after 2 messages the


bluejacker will desist and move on.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Warning

 Never try to ‘hack’ a device for the purpose of copying or


modifying any files on any device or upload any executable
files.

 By hacking a device you are committing an offence under the


“Computer misuse act 1990”, which states it is an unauthorized
access to any computer.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Conclusion

 Bluejacking is a technique by which we can interact with new


people and has ability to revolutionaries market by sending
advertisement about the product, enterprise etc.

 On the Bluetooth configured mobile phone so that the people


get aware about them by seeing them on the phone.

<slide Title> | CONFIDENTIAL 2013 21 April 2019


References

 www.ijecs.in-The new and clear approach to Bluejacking.


 Bluetooth_hacking _browning _kessler-a case study.
 Bluejacking-slide share.
 BluejackQ. http://www.bluejackq.com
 Seminar Report on bluejacking by
http://www.seminarpaper.com

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Query ?

<slide Title> | CONFIDENTIAL 2013 21 April 2019


Thank You!

Thank You!

<slide Title> | CONFIDENTIAL 2013 21 April 2019

You might also like