SlideShare une entreprise Scribd logo
1  sur  21
BLUEJACKING
GROUP 4
LOADING
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
START SESSION
END SESSION
INTRODUCTION

BLUEJACKING
SOFTWARE

ORIGIN

USAGE OF
BLUEJACKING

HOW TO DO?

CONCLUSION
Bluejacking is the sending of unsolicited messages
over Bluetooth to Bluetooth-enabled devices
UNSOLICITED MESSAGE - Message transmitted in
response to a locally occurring event, rather than an
explicit remote request.
Bluetooth has a very limited range; usually around 10
meters on mobile phones, but laptops can reach up to
100 meters with powerful transmitters.
Bluejacking also mean for sending a vCard which
typically contains a message in the name field
(i.e. for bluedating or bluechat) to another Bluetooth
enabled device via the OBEX protocol.
BLUEJACKING CAN BE DONE IN DEVICES LIKE

LAPTOP

MOBILE

COMPUTER

PDA
INTRODUCTION

BLUEJACKING
SOFTWARE

ORIGIN

USAGE OF
BLUEJACKING

HOW TO DO?

CONCLUSION
ORIGIN
This bluejack phenomenon started after a
Malaysian IT consultant named “Ajack” posted a
comment on a mobile phone forum.
Ajack told IT Web that he used his Ericsson cell phone
in a bank to send a message to someone with a Nokia
7650.
Ajack did a Bluetooth discovery to see if there was
another Bluetooth device around. Discovering a Nokia
7650 in the vicinity, he created a new contact and
filled in the first name with „Buy Ericsson! and sent a
business card to the Nokia phone.
INTRODUCTION

BLUEJACKING
SOFTWARE

ORIGIN

USAGE OF
BLUEJACKING

HOW TO DO?

CONCLUSION
HOW TO BLUEJACK
Assuming that you now have a Bluetooth phone in your hands, the
first thing to do is to make sure that Bluetooth is enabled. You will
need to read the handbook of the particular phone (or PDA etc) that
you have but somewhere in the Menu item you will find the item
that enables and disabled Bluetooth.
Your phone or PDA will start to search the airwaves for other
devices within range. If you are lucky you will see a list of them
appear, or it will say that it cannot find any. If the latter happens then
relocate to another crowd or wait a while and try again. If you have a
list of found devices then let the fun begin
THE VARIOUS STEPS INVOLVED – IN MOBILE
First press the 5way joystick down
Then choose "New
contact"

STEP1

STEP2

Then choose options

STEP3

Then press options

Then in the first line
choose your desired
message

STEP6

Then press done

STEP4

Then go to the contact

STEP5

STEP7

STEP8

STEP10

Then choose "Via
Bluetooth"
Then select & send
your message

Then scroll down to
send
Then the phone will be
searching for enabled
Devices.

STEP9

STEP11
THE VARIOUS STEPS INVOLVED – IN COMPUTER

Go to contacts in your Address Book program (eg MS Outlook)
Create a new contact
Enter the message into one of the 'name' fields
Save the new contact
Go to the address book
Right-click on the message/contact

Go to action
Go to Send to Bluetooth
Select a device from the list and double click on it
INTRODUCTION

BLUEJACKING
SOFTWARE

ORIGIN

USAGE OF
BLUEJACKING

HOW TO DO?

CONCLUSION
BLUEJACKING SOFTWARE

Features:
Features:

Features:

BlueBug attack
Bluesniff is bluetooth wardriving utility.
ItHeloMotoconnect with other phone
allow to attack
useful for finding discoverable and hidden bluetooth
BlueSnarf
without any paring.
devices.
ItOBEXsend error messages to multiple
can Object Push

user at one time .

Operates on Linux
INTRODUCTION

BLUEJACKING
SOFTWARE

ORIGIN

USAGE OF
BLUEJACKING

HOW TO DO?

CONCLUSION
USAGE OF BLUEJACKING
MAIN USE OF BLUEJACKING
INTRODUCTION

BLUEJACKING
SOFTWARE

ORIGIN

USAGE OF
BLUEJACKING

HOW TO DO?

CONCLUSION
Bluejacking is a technique by which we can
interact with new people and has ability to
revolutionaries market by sending advertisement
about the product,enterprise etc.
On the Bluetooth configured mobilephone so that
the people get aware about them byseeing them on
the phone
START SESSION
END SESSION
THANK YOU

Contenu connexe

Tendances

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 
Digitaljewellery presentation
Digitaljewellery presentationDigitaljewellery presentation
Digitaljewellery presentation
aishwarya_320
 

Tendances (20)

Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Digitaljewellery presentation
Digitaljewellery presentationDigitaljewellery presentation
Digitaljewellery presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Presentation on wireless communication
Presentation on wireless communicationPresentation on wireless communication
Presentation on wireless communication
 
Seminar Report on NFC
Seminar Report on NFCSeminar Report on NFC
Seminar Report on NFC
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 

En vedette

Airborne internet-presentation(my)
Airborne internet-presentation(my)Airborne internet-presentation(my)
Airborne internet-presentation(my)
Rahul Raj
 
A presentation on MRAM
A presentation on MRAMA presentation on MRAM
A presentation on MRAM
Mohammed Iqbal
 

En vedette (15)

Bluejacking
BluejackingBluejacking
Bluejacking
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Apple talk
Apple talkApple talk
Apple talk
 
ERP
ERPERP
ERP
 
Bluejacking by krishna soni
Bluejacking by krishna soniBluejacking by krishna soni
Bluejacking by krishna soni
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
5 g Technology
5 g  Technology5 g  Technology
5 g Technology
 
Airborne internet
Airborne internetAirborne internet
Airborne internet
 
Airborne internet-presentation(my)
Airborne internet-presentation(my)Airborne internet-presentation(my)
Airborne internet-presentation(my)
 
Airborne internet
Airborne internetAirborne internet
Airborne internet
 
A presentation on MRAM
A presentation on MRAMA presentation on MRAM
A presentation on MRAM
 
SQL Slammer Worm
SQL Slammer WormSQL Slammer Worm
SQL Slammer Worm
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 

Similaire à Bluejacking

208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
smilichitti
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentation
ali100
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 

Similaire à Bluejacking (20)

Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Go TeNNa
Go TeNNaGo TeNNa
Go TeNNa
 
Defeating spyware and forensics on the black berry draft
Defeating spyware and forensics on the black berry draftDefeating spyware and forensics on the black berry draft
Defeating spyware and forensics on the black berry draft
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentation
 
Beginners intro-smartphones
Beginners intro-smartphonesBeginners intro-smartphones
Beginners intro-smartphones
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
COMODO UNITE
COMODO UNITECOMODO UNITE
COMODO UNITE
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 

Dernier

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 

Dernier (20)

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Essential Safety precautions during monsoon season
Essential Safety precautions during monsoon seasonEssential Safety precautions during monsoon season
Essential Safety precautions during monsoon season
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 

Bluejacking