SlideShare une entreprise Scribd logo
1  sur  19
SEMINAR ON
BLUEJACKING
Kamonasish Hore
guist. CSE
Roll No. 100103003
INTRODUCTION
• Bluejacking is sending of unsolicited message over
Bluetooth to Bluetooth-Enabled devices such as mobile
phone, PDA (Personal Digital Assistance) or Laptops,
by sending a vCard (or Business Card) which typically
contain a message in the name field via OBEX (Object
X-change) protocol.
• Bluejacking do not remove or alter any data from the
device.
• The person who is being attacked does not know any
information about the hacker except the name assigned
to the hacker’s mobile phone.
TECHNOLOGY USED
• BLUETOOTH TECHNOLOGY.
• vCards (Business Card).
• OBEX protocol.
BLUETOOTH TECHNOLGY
• Short private area that uses radio frequencies to
transmit data.
• Has a very limited range , usually 10 meters on mobile
phones and around 100 meters on laptops.
• Operates at Unlicensed Industrial Scientific and
Medical (ISM) band at 2.4 GHz power.
• Connects various devices alike laptop , camera, mobile,
mouse, etc. in a PAN (Personal Area Network) via RF
link through short-range piconets.
• Low power.
• Low cost.
• Has ability to be full duplex ability to transmit data and
voice transmission simultaneously.
vCards
• vCard (Versit Card) is a file format standard for
electronic business card.
• Contain name , address information, phone numbers ,
email , birthdays , etc.
OBEX PROTOCOL
• OBEX (abbreviation of Object Exchange) is a
communication protocol that facilitates the exchange
of binary objects between devices.
• Helps to exchange business card , data , even
applications.
• Initially OBEX was designed for infrared, latterly
now has been adopted by BLUETOOTH also used
over USB.
REQUIREMENTS
• A BLUETOOTH enabled cell phone.
• A place with a lot of people having their
BLUETOOTH device switched on.
HOW TO BLUEJACK
• Discover an area with a good number of mobile users
as restro , mall, railway station, bank, classroom, etc.
• Create a new contact in your phonebook of your cell
phone named something surprising as “Hey, you
have been Bluejacked” or “Virus Received”
• Search for the available BLUETOOTH in your range
to send the saved contact.
• The receiver is thereby distinguished by message tone
or by discovering the owner’s facial expression.
USAGE OF BLUEJACKING
• Shopping mall
• Train station
• Cinema hall
• Café/ Pub
• Classroom
CODE OF ETHICS
• Do not hack any device
• Do not send any abusive messages.
• Do not threaten anyone
• Must not reveal ourself to the victim.
• Do disable Bluetooth if you don’t want to be
BLUEJACKED
RELATED CONCEPTS
• BLUESNARFING
• BLUECASTING
• BLUEBUGGING
BLUESNARFING
• Stealing of information from victim’s Bluetooth
device often between phone, laptops, PDA’s ,
etc.
• This allows access to a calendar, contact list,
emails and sms and moreover some user can
steal even images and private videos.
• Bluesnarfing can also be done by guessing the
device’s MAC address (if known).
BLUECASTING
• It is generally provisioned by Bluetooth Kiosk, a
physical server provisioning the digital media over
Bluetooth to interested device.
• In some temples which offer ringtone , wallpapers of
god use Bluecasting.
• Many companies also use to advertise various offers
by Bluecasting.
BLUEBUGGING
• Form of Bluetooth Attack.
• Allows user to take control of a victim’s phone to call
the user’s phone and can even send messages.
• Mechanism is being carried out using Laptop, with
the use of powerful PDAs and mobile devices.
COUNTER MEASURES
• TURN OFF BLUETOOTH device until when not in
use.
• Set the BLUETOOTH device to HIDDEN mode.
• Ignore BLUEJACKING vCards (Business Card)
Authentication
Start
Already
Authentic-
ated
Link
Pairing
allowing
Pairing
Authenticate
OK
Authenticate
Fail
Imp Authenticate
Yes
No
Yes
No
No
Fail
Yes
Ok
Fail due to
authentication
Stop
No device
found
CONCLUSION
BLUEJACKING is a technique by which we can
interact with a new person and can bring a great change
in the world of advertisement by sending about the
products , enterprises etc. on the Bluetooth.
So we conclude that in future this technology becomes
the key for advertisement to interact with the world.
REFRENCES
• http://en.wikipedia.org/wiki/Bluejacking
• http://www.webopedia.com/TERM/B/bluejac
king.html
• http://www.thehackingarticles.com/2011/05/
what-is-bluejacking.html#.UQTSkDfu7l4
• http://www.bluejackingtools.com/
• http://www.seminarsonly.com/computer%20s
cience/Bluejacking.php
THANK YOU. . .

Contenu connexe

Tendances

how does smart phone works?
how does smart phone works?how does smart phone works?
how does smart phone works?Sakshi Bhargava
 
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanRohan Das
 
2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paper2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paperBoni
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentationjogiparthyramya
 
a-presentation-on-wireless-communication
 a-presentation-on-wireless-communication a-presentation-on-wireless-communication
a-presentation-on-wireless-communicationjhcid
 
Blue tooth by k pant
Blue tooth by  k pant Blue tooth by  k pant
Blue tooth by k pant Kaushal Pant
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyUmmar Ahmed
 
Mobile networking through mobile IP
Mobile networking through mobile IPMobile networking through mobile IP
Mobile networking through mobile IPShihab Alvi
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYVikas Jagtap
 

Tendances (20)

how does smart phone works?
how does smart phone works?how does smart phone works?
how does smart phone works?
 
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince Rohan
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paper2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paper
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
a-presentation-on-wireless-communication
 a-presentation-on-wireless-communication a-presentation-on-wireless-communication
a-presentation-on-wireless-communication
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
wireless communication
wireless communicationwireless communication
wireless communication
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Blue tooth by k pant
Blue tooth by  k pant Blue tooth by  k pant
Blue tooth by k pant
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Mobile networking through mobile IP
Mobile networking through mobile IPMobile networking through mobile IP
Mobile networking through mobile IP
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGY
 
Bluetooth - Overview
Bluetooth - OverviewBluetooth - Overview
Bluetooth - Overview
 

En vedette

Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)nurul ain
 
Residential cleaning
Residential cleaningResidential cleaning
Residential cleaningSusan Roy
 
Top Tips for Implementing ITIL successfully
Top Tips for Implementing ITIL successfullyTop Tips for Implementing ITIL successfully
Top Tips for Implementing ITIL successfullyTanya Marshall
 
Tcvb2 marco gomes_relatório
Tcvb2 marco gomes_relatório Tcvb2 marco gomes_relatório
Tcvb2 marco gomes_relatório Marco Gomes
 
Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4MaxBale
 
Entrevista com luís vaz de camões
Entrevista com luís vaz de camõesEntrevista com luís vaz de camões
Entrevista com luís vaz de camõesMarco Gomes
 
CSE SEMINAR: Introduction to Blended Learning
CSE SEMINAR: Introduction to Blended LearningCSE SEMINAR: Introduction to Blended Learning
CSE SEMINAR: Introduction to Blended Learningdigimuve
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 

En vedette (18)

Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
 
Lake View Resort
Lake View ResortLake View Resort
Lake View Resort
 
Residential cleaning
Residential cleaningResidential cleaning
Residential cleaning
 
18 rugosidade
18 rugosidade18 rugosidade
18 rugosidade
 
Top Tips for Implementing ITIL successfully
Top Tips for Implementing ITIL successfullyTop Tips for Implementing ITIL successfully
Top Tips for Implementing ITIL successfully
 
Tcvb2 marco gomes_relatório
Tcvb2 marco gomes_relatório Tcvb2 marco gomes_relatório
Tcvb2 marco gomes_relatório
 
Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4
 
Entrevista com luís vaz de camões
Entrevista com luís vaz de camõesEntrevista com luís vaz de camões
Entrevista com luís vaz de camões
 
Informatik
InformatikInformatik
Informatik
 
Knot over my Life
Knot over my LifeKnot over my Life
Knot over my Life
 
Informatica
InformaticaInformatica
Informatica
 
1107
11071107
1107
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
CSE SEMINAR: Introduction to Blended Learning
CSE SEMINAR: Introduction to Blended LearningCSE SEMINAR: Introduction to Blended Learning
CSE SEMINAR: Introduction to Blended Learning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 

Similaire à SEMINAR ON bluejackng (20)

My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee
 

SEMINAR ON bluejackng

  • 2. INTRODUCTION • Bluejacking is sending of unsolicited message over Bluetooth to Bluetooth-Enabled devices such as mobile phone, PDA (Personal Digital Assistance) or Laptops, by sending a vCard (or Business Card) which typically contain a message in the name field via OBEX (Object X-change) protocol. • Bluejacking do not remove or alter any data from the device. • The person who is being attacked does not know any information about the hacker except the name assigned to the hacker’s mobile phone.
  • 3. TECHNOLOGY USED • BLUETOOTH TECHNOLOGY. • vCards (Business Card). • OBEX protocol.
  • 4. BLUETOOTH TECHNOLGY • Short private area that uses radio frequencies to transmit data. • Has a very limited range , usually 10 meters on mobile phones and around 100 meters on laptops. • Operates at Unlicensed Industrial Scientific and Medical (ISM) band at 2.4 GHz power. • Connects various devices alike laptop , camera, mobile, mouse, etc. in a PAN (Personal Area Network) via RF link through short-range piconets. • Low power. • Low cost. • Has ability to be full duplex ability to transmit data and voice transmission simultaneously.
  • 5. vCards • vCard (Versit Card) is a file format standard for electronic business card. • Contain name , address information, phone numbers , email , birthdays , etc.
  • 6. OBEX PROTOCOL • OBEX (abbreviation of Object Exchange) is a communication protocol that facilitates the exchange of binary objects between devices. • Helps to exchange business card , data , even applications. • Initially OBEX was designed for infrared, latterly now has been adopted by BLUETOOTH also used over USB.
  • 7. REQUIREMENTS • A BLUETOOTH enabled cell phone. • A place with a lot of people having their BLUETOOTH device switched on.
  • 8. HOW TO BLUEJACK • Discover an area with a good number of mobile users as restro , mall, railway station, bank, classroom, etc. • Create a new contact in your phonebook of your cell phone named something surprising as “Hey, you have been Bluejacked” or “Virus Received” • Search for the available BLUETOOTH in your range to send the saved contact. • The receiver is thereby distinguished by message tone or by discovering the owner’s facial expression.
  • 9. USAGE OF BLUEJACKING • Shopping mall • Train station • Cinema hall • Café/ Pub • Classroom
  • 10. CODE OF ETHICS • Do not hack any device • Do not send any abusive messages. • Do not threaten anyone • Must not reveal ourself to the victim. • Do disable Bluetooth if you don’t want to be BLUEJACKED
  • 11. RELATED CONCEPTS • BLUESNARFING • BLUECASTING • BLUEBUGGING
  • 12. BLUESNARFING • Stealing of information from victim’s Bluetooth device often between phone, laptops, PDA’s , etc. • This allows access to a calendar, contact list, emails and sms and moreover some user can steal even images and private videos. • Bluesnarfing can also be done by guessing the device’s MAC address (if known).
  • 13. BLUECASTING • It is generally provisioned by Bluetooth Kiosk, a physical server provisioning the digital media over Bluetooth to interested device. • In some temples which offer ringtone , wallpapers of god use Bluecasting. • Many companies also use to advertise various offers by Bluecasting.
  • 14. BLUEBUGGING • Form of Bluetooth Attack. • Allows user to take control of a victim’s phone to call the user’s phone and can even send messages. • Mechanism is being carried out using Laptop, with the use of powerful PDAs and mobile devices.
  • 15. COUNTER MEASURES • TURN OFF BLUETOOTH device until when not in use. • Set the BLUETOOTH device to HIDDEN mode. • Ignore BLUEJACKING vCards (Business Card)
  • 17. CONCLUSION BLUEJACKING is a technique by which we can interact with a new person and can bring a great change in the world of advertisement by sending about the products , enterprises etc. on the Bluetooth. So we conclude that in future this technology becomes the key for advertisement to interact with the world.
  • 18. REFRENCES • http://en.wikipedia.org/wiki/Bluejacking • http://www.webopedia.com/TERM/B/bluejac king.html • http://www.thehackingarticles.com/2011/05/ what-is-bluejacking.html#.UQTSkDfu7l4 • http://www.bluejackingtools.com/ • http://www.seminarsonly.com/computer%20s cience/Bluejacking.php