Publicité
Publicité

Contenu connexe

Publicité
Publicité

Blue jacking

  1. BLUE JACKING
  2. Abstract  Bluejacking is the sending of unsolicited messages over bluetooth to bluetooth-enabled devices such as mobile phones, laptop computers, PDAs.  This technology allows mobile phone users to send business cards anonymously using bluetooth wireless technology.  Bluejacking is also known as Bluehacking. http://1.bp.blogspot.com/ZGfR6MujmlI/UJjvDI4ku yI/AAAAAAAAAOg/cwrXwbOfdmQ/s1600/bluejac king.gif
  3. Introduction  Bluejacking is an attack conducted on Bluetooth-enabled devices like mobile phones, laptops, computers, PDAs.  Bluetooth has a very limited range.  Bluejacking also mean for sending a Vcard via the OBEX protocol. Computer Laptop Mobile Phone
  4. OBEX Protocol  OBJECT EXCHANGE is a transfer protocol that defines data object and a communication protocol for devices that can exchange data and commands in a resource-sensitive standardized fashion.  This technology works over bluetooth and Infrared Data Association(IrDA) protocols. OBEX is primarily used as a push or pull application. The typical example could be an object push of business cards to someone else.  It performs a function that is similar to Hypertext Transfer Protocol(HTTP) but it does not require the resources that an HTTP server requires making it perfect for low-end devices with limited resources.
  5. https://darbi.org/wpcontent/uploads/2017/05 /bluetooth-technology.gif What is Bluetooth?  Bluetooth is defined as a wireless technology that provides short range communications.  Bluetooth consists of very limited range usually around 10 meters for mobile phones, but for laptops it can reach upto 100 meters with powerful transmitters.  Bluetooth is for synchronizing emails, sending messages, or connecting to remote headsets.
  6. How to Bluejack?  Bluetooth devices only work over short distances, so we need to find a big crowd.  Create a new contact in phone book .  Press done/Ok option. Save this new contact.  Then click on the contact created. Go to action choose “via Bluetooth” or “send to Bluetooth” option.  Click the “search” option for discovering active bluetooth devices and select a device from the list.  After the selection of the particular device, the short message would be transmitted to it. Thus, the device would be Bluejacked.
  7. How does the sender send the bluejack message. What does the receiver see on the screen as he receives the bluejack message.
  8. Software tools  Blue spam : Searches for all discoverable bluetooth device and sends a file to them if they support OBEX protocol.  Free jack : Compatible to java phones like Nokia N-series.  E-jack : Allows sending of text messages to other bluetooth enabled devices.  Meeting point : Perfect tool to search for bluetooth devices. This software is compatible with pocket pc, windows.
  9. Places where bluejacking occurs
  10. Attacks of Bluejacking  Bluesnarfing  Bluecasting  Bluebugging
  11. Bluesnarfing  In this, the attacker gets unauthorised access to the information on a wireless device through a bluetooth connection. The wireless devices can be mobile phones, desktops, laptops and Personal Digital Assistant (PDAs).  Once the attacker gains access, he can have access to the victim’s calendars, contact lists, emails and text messages. Not only that but also they can copy user pictures and private videos.  Bluesnarfing can also be done even if your device is hidden.
  12. Blue casting  Provision of any small digital media to suitable media provisioning enabled devices over bluetooth via the OBEX protocol.
  13. Bluebugging  Bluebugging is a hacking technique that allows individuals to access a device with a discoverable bluetooth connection.  Allows the user to take control of a victim’s phone to call the user’s phone.  It is similar to phone eavesdropping or bugging.
  14. Usage of Bluejacking  Busy shopping centre  Railway Station  Café/ Restaurant  High Street  Cinema  Mobile phone shop  Electronic shop Busy shopping centre Café/Restaurant Railway Station High Street
  15. Advantages of Bluejacking  Usually, a bluejacker will best ship a text message, however with modern phones it is possible to send images or sounds as well.  We can easily transfer files from mobile to laptop or from mobile to mobile in a short duration.  We can even enjoy music by wireless headphones via bluejacking.
  16. Disadvantages of Bluejacking  Due to growth in the availability of bluetooth enabled gadgets, those devices have end up prone to virus attacks and complete takeover of devices via a bug software.  Those virus pruned devices can even cause irritation in any man or woman as these are unwelcomed messages or a few jokes.  They can annoy absolutely everyone without any difficulty.
  17. Applications  Viral Communication  Community activities  Location based services
  18. Prevention  Setting the bluetooth on the right mode  Factory reset of the phone  Keep away from strangers  Putting off the bluetooth when it has no use  Set password for bluetooth
  19. Security Issues  Security Mode-1: In this mode the device does not implement any security procedures, and allows any other device to initiate connections with it.  Security Mode-2: Security is enforced after the link is established, allowing higher level applications to run more flexible security policies.  Security Mode-3: Security controls such as authentication and encryption are implemented at the baseband level before the connection is established. Bluetooth allows different security levels to be defined for devices and services.
  20. Conclusion  In conclusion, Bluejacking is not all harmful. By using it, we can interact with new people. The only thing it can do at worst is to irritate you by sending unsolicited messages by changing the visibility of your bluetooth to invisible or non-discoverable mode.  It has an ability to bring a revolutionerise market by sending advertisement about the product, enterprise etc., on the Bluetooth configured mobile phone so that the people get aware about them by seeing them on the phone.  It can be helpful as well by providing you with lots of useful information. So, use this technology properly as it is intended to, rather than just making wrong use of it.
  21. References  Bluejacking by Jonatha Samuel, First Edition: 1997 by Tata McGraw Hill.  bluejackQ.com Index Archived October 5, 2006 at Wayback Machine.  http://en.Wikipedia.org/wiki/Bluejackin  http://www.howstuffworks.com/bluejacking.htm
  22. Thank You
Publicité