2. CONTENTS
INTRODUCTION OF BLUE
JACKING
BLUETOOTH
HOW TO BLUE JACK
STEPS
SOFTWARE TOOLS
USAGE OF BLUE JACKING
PLACES
SECURITY ISSUE
RELATED CONCEPTS
PREVENTION
CONCLUSION
4. What is luetooth
Bluetooth is define as a wirless technology that
provides short range communications.
Bluetooth devices connect have the ability to connect
with up to seven devices per piconet
5. How to bluejack
To make sure that bluetooth is
enabled.
To read the hand book of the
particular Phone PDA etc
phone and laptop will start searching
airwaves for other devices with in
range
To see a list of them appears, or it will
take cannot find any
15. Is the unauthorized access the information from a
wireless device through a bluetooth connection,
often between phone, desktops, laptops, and PDAs
even if your device is hidden bluesnarfing can also
be done
16. Provision of any small media to
suitable media provisioning enabled
devices over bluetooth
17. Form of bluetooth attacks
Allows the user to take control
of a victim’s phone to call the
user’s phone