SlideShare une entreprise Scribd logo
1  sur  17
Presented by:
G.Dharani
B.Selva Bharthi
Abstract:
 Introduction to Bluejacking.
 Origin.
 Application.
 Usage.
 How to bluejack?
 Process of Bluejacking.
 Prevention.
 Code of ethics.
 Conclusion.
Introduction to Bluejacking
 Bluejacking is the sending of unsolicited messages
over Bluetooth-enabled devices.
Bluetooth has a very limited range.Usually around 10
meters on mobile phones, but laptops can reach upto 100
meters with powerful transmitters.
Bluejacking can be done in devices like
Laptop Mobile
PDA
Origin
Ajack did a bluetooth discovery to see if there
was another bluetooth device around.
Ajack told IT Web that he used his Ericsson
cellphone in a bank to send a message to
someone with a Nokia 7650.
This bluejack phenomenon started after a
Malaysian IT consultant named “Ajack” posted a
comment on a mobile phone forum.
Application
Bluejacking is done when where there is
many devices has avaiable bluetooth devices.
These places mainly include Railway
Station, Airport,Hotels,Bus Stations,Café &
Bank.
Usage
 Experimental results show that the system provides a
viable solution for realizing permission-based mobile
advertising.
The main use of bluejacking tools or bluejacking is in
advertising purpose and location based purpose.
Bluejacking can be used in many fields and for various
purposes like in the busy shopping centre,train station,
high street,cinema,café/restaurant.
How to bluejack?
Assuming that you now have a Bluetooth
phone in your hands, the first thing to do is to
make sure that Bluetooth is enabled.
The handbook of the particular phone (or PDA
etc) that you have but somewhere in the Menu
item you will find the item that enables and
disabled Bluetooth.
The various steps involved –in
mobile
First press the 5-way joystick down.
Then choose "New contact“.
Then in the first line choose your desired
message.
Then go to the contact.
Then scroll down to send.
Then choose "Via Bluetooth”.
Then press "Select"
The various steps involved – in
computer/laptop
Create a new contact.
Enter the message into one of the name fields.
Save the new contact.
Go to the address book.
Right-click on the message/contact.
Go to action.
Go to send Bluetooth.Click on other and choose a
device by double clicking.
Process of Bluejacking
Go to contact
Create a new
contact
Write a short
message you
want to send in
next line
Our phone will
search for
devices
Select this
contact and
send Via
bluetooth
Save this
contact
All the devices
near us will be
displayed
Select any one
we like and send
We have
bluejacked
someone
Prevention
To prevent being Bluejacked, disable
Bluetooth on the mobile device when not in
use.
The device will not show up on a
“Bluejacker’s” phone when he/she attempts
to send a message and they do not queue
up.
Code of ethics
Do not hack any device.
Do not send any abusive message.
Do not threaten anyone.
Must not reveal ourself to the victim.
Do disable if you don’t want to bluejack
Conclusion
Low cost and power consumption
technology.
Bluejacking is a technique by which we
can interact with new people.
Bluejacking

Contenu connexe

Tendances

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 
Blue eyes technology..document (1)
Blue eyes technology..document (1)Blue eyes technology..document (1)
Blue eyes technology..document (1)
yuvatejreddy
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
David Livingston J
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
Brockanurag
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
Colloquium
 

Tendances (20)

Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Blue eyes technology..document (1)
Blue eyes technology..document (1)Blue eyes technology..document (1)
Blue eyes technology..document (1)
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
Bluethooth technology
Bluethooth technologyBluethooth technology
Bluethooth technology
 
Blue eyes technology full ppt
Blue eyes technology full pptBlue eyes technology full ppt
Blue eyes technology full ppt
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Blue eyes seminar report
Blue eyes seminar reportBlue eyes seminar report
Blue eyes seminar report
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
 

En vedette

Holographic Data Storeg ppt
Holographic Data Storeg pptHolographic Data Storeg ppt
Holographic Data Storeg ppt
Sameer Gupta
 

En vedette (20)

Bluejacking
BluejackingBluejacking
Bluejacking
 
Crusoe Micorprocessor
Crusoe MicorprocessorCrusoe Micorprocessor
Crusoe Micorprocessor
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
 
Holographic data storage
Holographic data storageHolographic data storage
Holographic data storage
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data Storage
 
Holographic data Storage
Holographic data StorageHolographic data Storage
Holographic data Storage
 
FEMTOCELL
FEMTOCELLFEMTOCELL
FEMTOCELL
 
Femtocell
FemtocellFemtocell
Femtocell
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
Cordect
CordectCordect
Cordect
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
 
Femtocell Technologies By Vipin
Femtocell Technologies By VipinFemtocell Technologies By Vipin
Femtocell Technologies By Vipin
 
SSH
SSHSSH
SSH
 
Femtocell
FemtocellFemtocell
Femtocell
 
Crusoe processor
Crusoe    processorCrusoe    processor
Crusoe processor
 
Holographic data storage presentation
Holographic data storage presentationHolographic data storage presentation
Holographic data storage presentation
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Holographic Data Storeg ppt
Holographic Data Storeg pptHolographic Data Storeg ppt
Holographic Data Storeg ppt
 
FemtoCell
FemtoCellFemtoCell
FemtoCell
 

Similaire à Bluejacking

208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
smilichitti
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentation
ali100
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 
SYANDES write-up - iBeacon
SYANDES write-up - iBeaconSYANDES write-up - iBeacon
SYANDES write-up - iBeacon
Rhea Posadas
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
Guneet Pahwa
 

Similaire à Bluejacking (19)

Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
 
3 Blue Presentation
3 Blue Presentation3 Blue Presentation
3 Blue Presentation
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
bluejacking
bluejackingbluejacking
bluejacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Bluetooth Chat Application.pptx
Bluetooth Chat Application.pptxBluetooth Chat Application.pptx
Bluetooth Chat Application.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Rococo Software Q3 2010
Rococo Software Q3 2010Rococo Software Q3 2010
Rococo Software Q3 2010
 
SYANDES write-up - iBeacon
SYANDES write-up - iBeaconSYANDES write-up - iBeacon
SYANDES write-up - iBeacon
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Use Access Control Systems?
Use Access Control Systems?Use Access Control Systems?
Use Access Control Systems?
 

Bluejacking

  • 2. Abstract:  Introduction to Bluejacking.  Origin.  Application.  Usage.  How to bluejack?  Process of Bluejacking.  Prevention.  Code of ethics.  Conclusion.
  • 3. Introduction to Bluejacking  Bluejacking is the sending of unsolicited messages over Bluetooth-enabled devices. Bluetooth has a very limited range.Usually around 10 meters on mobile phones, but laptops can reach upto 100 meters with powerful transmitters.
  • 4. Bluejacking can be done in devices like Laptop Mobile PDA
  • 5. Origin Ajack did a bluetooth discovery to see if there was another bluetooth device around. Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia 7650. This bluejack phenomenon started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.
  • 6. Application Bluejacking is done when where there is many devices has avaiable bluetooth devices. These places mainly include Railway Station, Airport,Hotels,Bus Stations,Café & Bank.
  • 7. Usage  Experimental results show that the system provides a viable solution for realizing permission-based mobile advertising. The main use of bluejacking tools or bluejacking is in advertising purpose and location based purpose. Bluejacking can be used in many fields and for various purposes like in the busy shopping centre,train station, high street,cinema,café/restaurant.
  • 8. How to bluejack? Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled. The handbook of the particular phone (or PDA etc) that you have but somewhere in the Menu item you will find the item that enables and disabled Bluetooth.
  • 9. The various steps involved –in mobile First press the 5-way joystick down. Then choose "New contact“. Then in the first line choose your desired message. Then go to the contact. Then scroll down to send. Then choose "Via Bluetooth”. Then press "Select"
  • 10. The various steps involved – in computer/laptop Create a new contact. Enter the message into one of the name fields. Save the new contact. Go to the address book. Right-click on the message/contact. Go to action. Go to send Bluetooth.Click on other and choose a device by double clicking.
  • 11.
  • 12. Process of Bluejacking Go to contact Create a new contact Write a short message you want to send in next line Our phone will search for devices Select this contact and send Via bluetooth Save this contact All the devices near us will be displayed Select any one we like and send We have bluejacked someone
  • 13. Prevention To prevent being Bluejacked, disable Bluetooth on the mobile device when not in use. The device will not show up on a “Bluejacker’s” phone when he/she attempts to send a message and they do not queue up.
  • 14. Code of ethics Do not hack any device. Do not send any abusive message. Do not threaten anyone. Must not reveal ourself to the victim. Do disable if you don’t want to bluejack
  • 15.
  • 16. Conclusion Low cost and power consumption technology. Bluejacking is a technique by which we can interact with new people.