2. INTRODUCTION
• Bluejacking is sending of unsolicited message over
Bluetooth to Bluetooth-Enabled devices such as mobile
phone, PDA (Personal Digital Assistance) or Laptops,
by sending a vCard (or Business Card) which typically
contain a message in the name field via OBEX (Object
X-change) protocol.
• Bluejacking do not remove or alter any data from the
device.
• The person who is being attacked does not know any
information about the hacker except the name assigned
to the hacker’s mobile phone.
4. BLUETOOTH TECHNOLGY
• Short private area that uses radio frequencies to
transmit data.
• Has a very limited range , usually 10 meters on mobile
phones and around 100 meters on laptops.
• Operates at Unlicensed Industrial Scientific and
Medical (ISM) band at 2.4 GHz power.
• Connects various devices alike laptop , camera, mobile,
mouse, etc. in a PAN (Personal Area Network) via RF
link through short-range piconets.
• Low power.
• Low cost.
• Has ability to be full duplex ability to transmit data and
voice transmission simultaneously.
5. vCards
• vCard (Versit Card) is a file format standard for
electronic business card.
• Contain name , address information, phone numbers ,
email , birthdays , etc.
6. OBEX PROTOCOL
• OBEX (abbreviation of Object Exchange) is a
communication protocol that facilitates the exchange
of binary objects between devices.
• Helps to exchange business card , data , even
applications.
• Initially OBEX was designed for infrared, latterly
now has been adopted by BLUETOOTH also used
over USB.
7. REQUIREMENTS
• A BLUETOOTH enabled cell phone.
• A place with a lot of people having their
BLUETOOTH device switched on.
8. HOW TO BLUEJACK
• Discover an area with a good number of mobile users
as restro , mall, railway station, bank, classroom, etc.
• Create a new contact in your phonebook of your cell
phone named something surprising as “Hey, you
have been Bluejacked” or “Virus Received”
• Search for the available BLUETOOTH in your range
to send the saved contact.
• The receiver is thereby distinguished by message tone
or by discovering the owner’s facial expression.
9. USAGE OF BLUEJACKING
• Shopping mall
• Train station
• Cinema hall
• Café/ Pub
• Classroom
10. CODE OF ETHICS
• Do not hack any device
• Do not send any abusive messages.
• Do not threaten anyone
• Must not reveal ourself to the victim.
• Do disable Bluetooth if you don’t want to be
BLUEJACKED
12. BLUESNARFING
• Stealing of information from victim’s Bluetooth
device often between phone, laptops, PDA’s ,
etc.
• This allows access to a calendar, contact list,
emails and sms and moreover some user can
steal even images and private videos.
• Bluesnarfing can also be done by guessing the
device’s MAC address (if known).
13. BLUECASTING
• It is generally provisioned by Bluetooth Kiosk, a
physical server provisioning the digital media over
Bluetooth to interested device.
• In some temples which offer ringtone , wallpapers of
god use Bluecasting.
• Many companies also use to advertise various offers
by Bluecasting.
14. BLUEBUGGING
• Form of Bluetooth Attack.
• Allows user to take control of a victim’s phone to call
the user’s phone and can even send messages.
• Mechanism is being carried out using Laptop, with
the use of powerful PDAs and mobile devices.
15. COUNTER MEASURES
• TURN OFF BLUETOOTH device until when not in
use.
• Set the BLUETOOTH device to HIDDEN mode.
• Ignore BLUEJACKING vCards (Business Card)
17. CONCLUSION
BLUEJACKING is a technique by which we can
interact with a new person and can bring a great change
in the world of advertisement by sending about the
products , enterprises etc. on the Bluetooth.
So we conclude that in future this technology becomes
the key for advertisement to interact with the world.