Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

Bluetooth Hacking

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Prochain SlideShare
Bluetooth Hacking
Bluetooth Hacking
Chargement dans…3
×

Consultez-les par la suite

1 sur 11 Publicité

Plus De Contenu Connexe

Plus récents (20)

Publicité

Bluetooth Hacking

  1. 1. <BLUE-T-ATTACK> Presented By SHRITAM KUMAR MUND CSE
  2. 2. Hidden Dangers of using Bluetooth
  3. 3. 3% 21% 64% 12% Place Where Bluetooth attacks occur: Home 3% Cafes 21% Stores and shopping malls 64% Public transportation 12%
  4. 4. Bluetooth Attacks:
  5. 5. 1. BLUEJACKING: Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.
  6. 6. 2. BLUESNARFING Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices.
  7. 7. 3. BLUEBUGGING Bluebugging is a form of Bluetooth attack often caused by a lack of awareness. It was developed after the onset of bluejacking and bluesnarfing.
  8. 8. PREVENTION • There is hardly any software available to prevent or detect blue-T- attacks. • Turn off Bluetooth. • Update your device on regular basis. • Change password when you come to know somting wrong happening to your device.
  9. 9. CONCLUSION • Low cost and power consumption technology. • It may have great future if it should follow codes ethics. Reference: website search: www.wikipedia.org Photos: Google images Book: Faster_Ankit Fadia
  10. 10. You might can’t catch the pickpocket, but you can stop the thief.
  11. 11. </THANK YOU>

×