0% found this document useful (0 votes)
295 views

Blue Jacking

This document discusses the concept of bluejacking, which is sending unsolicited messages to Bluetooth-enabled devices. It begins with defining bluejacking and Bluetooth technology. It then explains how bluejacking works by scanning for nearby Bluetooth devices and sending messages. It discusses the origin of the term from a user named "Ajack". It provides steps on how to bluejack and describes some software tools that can be used. It concludes by noting Bluetooth's security vulnerabilities but potential if configured properly.

Uploaded by

karan
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
295 views

Blue Jacking

This document discusses the concept of bluejacking, which is sending unsolicited messages to Bluetooth-enabled devices. It begins with defining bluejacking and Bluetooth technology. It then explains how bluejacking works by scanning for nearby Bluetooth devices and sending messages. It discusses the origin of the term from a user named "Ajack". It provides steps on how to bluejack and describes some software tools that can be used. It concludes by noting Bluetooth's security vulnerabilities but potential if configured properly.

Uploaded by

karan
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

PRESENTED BY

Karan Arora
01521402017

Course:BCA-V(E)
Batch:2017-20
Submitted to:Priyanka Rattan
CONTENTS
ABSTRACT
 INTRODUCTION
ORIGIN
 HOW TO BLUEJACK?
SOFTWARE TOOLS
 CODE OF ETHICS
WARNING
CONCLUSION
REFERENCES

1
ABSTRACT

 Bluejacking is t he sending of short , unsolicit ed m essages


over Bluetooth t o other Bluetooth-enabled devices.

 This technology allows mobile phone users t o send business


cards anonymously using Bluetooth wireless technology.

 Receiver does not know who has sent the message, but it has
the name and model of the phone used by the Bluejacker.

2
What is Bluetooth?
 Bluet oot h is a wireless t echnology t ha t provides short
range communications.

 Bluetooth consist of very limited range; usually around 10


meters on mobile phones, but for laptops it can reach up t o
100 meters with powerful transmitters.

 Bluetooth is for synchronizing email, sending messages,


or connecting t o a remote headset.

3
INTRODUCTION
 Bluejacking is an attack conducted on Bluetooth enabled
devices like smart phones, laptops and PDAs.

Laptop M obile Computer

PDA
4
 Bluejacking is done by an a tt acker t erm ed as
Bluejacker or Bluejack addict who forwards
unsolicit ed m essages t o a user of Bluet oot h-enabled
device.

 This message-transmitting attack resembles spam


and phishing attacks conducted against email users.

 Bluejacking can be perceived as either infuriating or


amusing, though it is relatively risk-free since the
recipient has the option t o decline.
5
 To choose the recipients of Bluejacks, the senders
complete a scan using their mobile phones t o search
for the available Bluetooth-enabled devices in their in
and around area.

 A Bluejacker picks one of the Bluetooth enabled


available devices and composes a message within a
body of the phone’s contact interface and sends the
message t o the recipient, and remains in the vicinity
t o observe any reactions expressed by the recipient.

6
ORIGIN OF BLUEJACKING
 This Bluejack phenomenon started after a Malaysian IT
consultant named “Ajack” posted a comment on a mobile
phone forum.

 Ajack told IT Web t hat he used his Ericsson cell phone in a


bank t o send a message t o someone with a Nokia 7650.

 Ajack did a Bluetooth discovery t o see if there was another


Bluetooth device around. Discovering a Nokia 7650 in the
vicinity, he created a new contact and filled in the first name
with ‘Buy Ericsson!' and sent a business card t o the Nokia
phone.

7
8
HOW TO BLUEJACK?

 Assuming t hat you now have a Bluetooth phone in your


hands, the first thing t o do is t o make sure t hat Bluetooth is
enabled. You will need t o read the handbook of the
particular phone (or PDA etc) that you have but somewhere
in the Menu item you will find the item t hat enables and
disabled Bluetooth.

9
Steps are as follows:

 Bluetooth devices only work over short


distances, so we need t o find a big crowd.

 We now need t o create a new Contact in our


Phone Book - rather putting someone’s
name in the Name field we must write short
message like – “Hey, you have been
BlueJacked!”

 Press done/ok option. Save this new contact


in the phone/address book of mobile
phone/laptop respectively .

10
 Then click on the contact created. Go t o action.
choose “via Bluetooth” or “Send t o Bluetooth” option.

 Click the “Search‟ option for discovering active


Bluetooth devices. Select a device from those list.

 After the selection of the particular device, the short


message would be transmitted t o it. Thus, the device
would be Bluejacked.

11
How does th e sender send
the Bluejack message.

What does the receiver see on


the screen as he receives the
Bluejack message .

12
Software Tools
 There are some softwares t o do Bluejacking activities in an
easier way.

 So by downloading t hat software on our personal


computer or on your Bluetooth configured or enabled
mobile phone we can do it directly by just searching the
Bluetooth enabled device and send an unsolicited
messages.

 There are many software tools available in the market and


the name is according t o their usage. Some of tools are
Redfang, Bluesniffer, Bluescanner, Bluesnarf and Bluebug.

13
 RedFang:
Whitehouse has designed a software tool called RedFang
which can discover Bluetooth enabled devices t hat have
been set t o be non discoverable.

 Bluesniffer:
Bluesniffer is a simple utility for finding discoverable and
hidden Bluetooth-enabled devices. It operates on Linux
and it is a graphics tool.

 Bluescanner:
Bluescanner searches out for the Bluetooth-enabled devices
and tries t o extract as much information as possible for
each newly discovered device.
14
 Bluesnarf:

• Bluesnarfing is a method of hacking


into a Bluetooth-enabled mobile phone.

• With this we can copy its entire


information like contact book, pictures,
their data etc.

• This software gives the complete


freedom t o the hacker, t o send a
“corruption code” which will completely
shut-down the phone down and make
the phone unusable.

15
 Bluebug:

• This simply exploits the Bluebug (It’s the


name of some set of Bluetooth security
holes) vulnerability of the Bluetooth-
enabled devices.

• By exploiting this one can access phone-


books, calls lists, data and other
information of t hat device.

16
Statistical report on Bluejacking tools

17
Code of Ethics
 Bluejackers will only send m essages or
pict ures. They will never t ry t o 'hack' a
device for t he purpose of copying or
m odifying any files on any device or
upload any executable files.

 Any such messages or pictures sent will


not be of an insulting, libelous or vulgur
in nature.

 If no interest is shown by the recipient


after 2 messages the bluejacker will desist
and move on.

18
Warning
 Never try t o 'hack' a device for the
purpose of copying or modifying
any files on any device or upload
any executable files. By hacking a
device you are committing an
offence under the “Computer
misuse act 1990”, which states it is
an offence t o obtain unauthorized
access t o any computer.

19
CONCLUSION
 Bluet oot h is a grea t t echnology wit h so many useful
applications.

 At the meanwhile, variety of Bluetooth hacking tools and


techniques are available in this world, Bluejacking being
the most vulnerable , which makes it a little riskier t o use
this technology.

 Bluetooth is not going t o go away because of a few


security flaws; instead it can be secure if configured
properly and used carefully with a proper understanding.

20
 So, use this technology properly as it is intended and
get best of it, rather than just making wrong use of it.
And users need t o be made aware of the
vulnerabilities of these devices so t hat he can use
Bluetooth more effectively, confidently and safely.

21
REFERENCES
 [1] www.ijecs.in- The new and clear approach to Bluejacking.

 [2] Bluetooth_hacking_browning_kessler-a case study.

 [3] Bluejacking-slide share .

 [4] From Bluetooth to RedFang-By Peter Piazza .

 [5] Bluetooth Security &Vulnerabilities information


security management handbook.

22
THANK YOU!

You might also like