Blue Jacking
Blue Jacking
Karan Arora
01521402017
Course:BCA-V(E)
Batch:2017-20
Submitted to:Priyanka Rattan
CONTENTS
ABSTRACT
INTRODUCTION
ORIGIN
HOW TO BLUEJACK?
SOFTWARE TOOLS
CODE OF ETHICS
WARNING
CONCLUSION
REFERENCES
1
ABSTRACT
Receiver does not know who has sent the message, but it has
the name and model of the phone used by the Bluejacker.
2
What is Bluetooth?
Bluet oot h is a wireless t echnology t ha t provides short
range communications.
3
INTRODUCTION
Bluejacking is an attack conducted on Bluetooth enabled
devices like smart phones, laptops and PDAs.
PDA
4
Bluejacking is done by an a tt acker t erm ed as
Bluejacker or Bluejack addict who forwards
unsolicit ed m essages t o a user of Bluet oot h-enabled
device.
6
ORIGIN OF BLUEJACKING
This Bluejack phenomenon started after a Malaysian IT
consultant named “Ajack” posted a comment on a mobile
phone forum.
7
8
HOW TO BLUEJACK?
9
Steps are as follows:
10
Then click on the contact created. Go t o action.
choose “via Bluetooth” or “Send t o Bluetooth” option.
11
How does th e sender send
the Bluejack message.
12
Software Tools
There are some softwares t o do Bluejacking activities in an
easier way.
13
RedFang:
Whitehouse has designed a software tool called RedFang
which can discover Bluetooth enabled devices t hat have
been set t o be non discoverable.
Bluesniffer:
Bluesniffer is a simple utility for finding discoverable and
hidden Bluetooth-enabled devices. It operates on Linux
and it is a graphics tool.
Bluescanner:
Bluescanner searches out for the Bluetooth-enabled devices
and tries t o extract as much information as possible for
each newly discovered device.
14
Bluesnarf:
15
Bluebug:
16
Statistical report on Bluejacking tools
17
Code of Ethics
Bluejackers will only send m essages or
pict ures. They will never t ry t o 'hack' a
device for t he purpose of copying or
m odifying any files on any device or
upload any executable files.
18
Warning
Never try t o 'hack' a device for the
purpose of copying or modifying
any files on any device or upload
any executable files. By hacking a
device you are committing an
offence under the “Computer
misuse act 1990”, which states it is
an offence t o obtain unauthorized
access t o any computer.
19
CONCLUSION
Bluet oot h is a grea t t echnology wit h so many useful
applications.
20
So, use this technology properly as it is intended and
get best of it, rather than just making wrong use of it.
And users need t o be made aware of the
vulnerabilities of these devices so t hat he can use
Bluetooth more effectively, confidently and safely.
21
REFERENCES
[1] www.ijecs.in- The new and clear approach to Bluejacking.
22
THANK YOU!