3. “Ajack” posted a comment on a mobile phone
forum.
Ajack told IT Web that he used his Ericsson
cell phone in a bank to send a message to
someone with a Nokia 7650.
Ajack did a Bluetooth discovery to see if there
was another Bluetooth device around.
Discovering a Nokia 7650, he created a new
contact and filled in the first name with ‘Buy
Ericsson! and sent a business card to the Nokia
phone.
4. To make sure that Bluetooth is enabled.
To read the handbook of the particular phone (or
PDA etc).
Phone or PDA will start to search the airwaves
for other devices within range.
To see a list of them appear, or it will say that it
cannot find any.
5. First press the 5way joystick down
Then choose "New
contact"
Then press done
Then choose options
Then in the first
line choose your
desired message
Then go to the contact
Then press options
Then choose "Via
Bluetooth"
Then select & send
your message
Then scroll down to
send
Then the phone will
search for enabled
Devices.
6. software tools
Blue spam:
Blue spam:
Searches for all discoverable Bluetooth devices.
Searches for all discoverable Bluetooth devices.
Sends aafile to them if they support OBEX.
Sends file to them if they support OBEX.
Meeting point:
Meeting point:
Perfect tool to search for bluetooth devices.
Perfect tool to search for bluetooth devices.
This software is compatible with pocket pc, windows.
This software is compatible with pocket pc, windows.
Free jack:
Free jack:
Compatible to java phone like Nokia N-series.
Compatible to java phone like Nokia N-series.
Easy jacking (eJack):
Easy jacking (eJack):
devices.
devices.
Allows sending of text Messages to other Bluetooth enabled
Allows sending of text Messages to other Bluetooth enabled
7. Usage Of Bluejacking
SY
BU ING
P
OP E R
SH N T
CE
Busy shopping centre
Railway Station
Café/ restaurant/ pub
On a train/ tube/ bus
High Street
Cinema
Mobile phone shop
Electronics shop
y
lw a
Rai tion
Sta
/
afé nt/
C
ura
st a b
re pu
/
rain
at
On e / b u s
tub
Hi
re
h St
g
et
8. Architecture
Piconet:
• The devices find each other and form a network called
“ piconet ” spontaneously.
• A piconet is a basic unit with up to 8 nodes.
• All communication are between master and slaves.
• Master controls clock and decides the time slot for the
device.
• In a piconet , there can be up to 255 parked nodes.
(i) Bluejacker - who carry out the bluejack.
(ii) Victim – Who receive the bluejack.
9. Code of Ethics
Don't send abusive messages.
Don't threaten anyone.
Don't put your personal information in a Blue Jack message.
Don't reveal yourself to the 'victim'.
Do disable Bluetooth if you don't want to be Blue Jacked.
10. Related Concepts
Related Concepts
Bluesnarfing:
The theft of information form a wireless device through a Bluetooth
connection.
This allows access to a calendar, contact list, emails and text
messages.
Bluesnarfing is much more serious in relation to ‘Blue jacking’.
Bluecasting:
Provision of any small digital media to suitable media provisioning
devices over Bluetooth via the OBEX protocol.
Bluebugging:
Blue bugging is a form of Bluetooth attack.
Allows the user to take control of a victim’s
phone to call the user’s phone
enabled
11. Earlier issue:
Promotes an environment that puts consumer devices at greater risk.
Complete memory contents of some mobile phones can be accessed
by a previously trusted paired device.
Phonebook and calendar can be obtained without owner’s
knowledge.
Present Scenario:
Primarily occurs in public spaces.
Security issues previously involved with blue jacking has been
resolved.
In order for information to be duplicated, the devices would have to
be paired. Bluejacking does not require a password to be entered
and therefore the two devices are not paired.
12. Control Measures:
Turn off your Bluetooth device when not in use.
Warning:
Never try to ‘hack’ a device.
Is an offence under the “computer misuse act
1990”.
13. Conclusion
Blue jacking is a technique by which
we can interact with new people.
It has ability to bring a revolution
market by sending advertisement.