Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

Blue Jacking

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Prochain SlideShare
Blue jacking
Blue jacking
Chargement dans…3
×

Consultez-les par la suite

1 sur 2 Publicité

Plus De Contenu Connexe

Les utilisateurs ont également aimé (20)

Publicité

Plus récents (20)

Publicité

Blue Jacking

  1. 1. Vi hang shah Blue Jacking Introduction Blue Jacking is technique of sending text message between devices that connected with Bluetooth. Blue jacking also allow sending multimedia content from one device to another devices. The range of sending content within 10 meters and there is no charge of it because it is connected with Bluetooth and its free. Blue jacking sounds like hijacking means Bluetooth hijacking, but a bluejacker never hijacks anything. Both parties remain in absolute control over their devices, and a bluejacker will not be able to take over your phone or steal your personal information. How to blue jack? 1. Go to address book and create a new contact. 2. When creating the contact, enter the message you wish to blue jack into the contact name part. 3. Save the contact. 4. Long press on contact and choose via send card Bluetooth. 5. Search for Bluetooth device within your range. 6. Select the device which you want to connect. 7. And send the contact to that device via Bluetooth 8. You will get the message “card sent” and then listen for the sms message tone of your victim’s phone. How to prevent form blue jacking? 1. Setting the Bluetooth on the right mode Adjust the setting of Bluetooth to non-discoverable mode. The non- discoverable mode hides the device from attackers or unknown people
  2. 2. Vi hang shah 2. Factory reset of the phone If your device was perpetrated at some point, it means that attacker’s device has been already been added as a trusted device on your phone. 3. Keep away from strangers Make it decline any message or connection request from unknown device. Most attack happen due to accepting connection request from stranger who then gets added as trusted devices. 4. Putting of the Bluetooth when it has no use If you don’t use the Bluetooth frequently, keep it off to avoid your device from being listed in the sender’s device search list. 5. Set password for Bluetooth Software Tools for blue jacking Blue spam Meeting point Freejack Easyjacking

×