Download - Final bluejacking
![Page 1: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/1.jpg)
SEMINAR ONBLUEJACKING
PERSENTED BY- PAYAL - 13/CS/57
PRIYANKA PARIA - 13/CS/63 MANJEET KUMAR - 13/CS/46
GUIDED BY: Mrs. P.PRADHAN
![Page 2: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/2.jpg)
CONTENTS1. INTRODUCTION2. BLUEJACKING CAN BE DONE IN..3. TECHNOLOGY USED4. BLUETOOTH TECHNOLOGY5. OBEX PROTOCOL6. WHAT DO YOU NEED?7. HOW TO BLUEJACK?8. USAGE OF BLUEJACKING?9. WHERE?10. CODE OF ETHICS11. CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING12. PREVENTIONS13. CONCLUSIONS
![Page 3: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/3.jpg)
INTRODUCTION
• Bluejacking is the sending of unsolicited messages over Bluetooth-enabled devices.
• Bluejacking do not remove or alter any data from
the device.
• The person who is being attacked does not know any information about the hacker except the name assigned to the hacker’s mobile phone.
![Page 4: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/4.jpg)
BLUEJACKING CAN BE DONE IN DEVICES LIKE
LAPTOPMOBILE
COMPUTER
PDA(personal digital assistant)
![Page 5: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/5.jpg)
TECHNOLOGY USED
• BLUETOOTH TECHNOLOGY.
• OBEX protocol.
![Page 6: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/6.jpg)
BLUETOOTH TECHNOLGY
• Short private area that uses radio frequencies to transmit data.
• Has a very limited range , usually 10 meters on mobile phones and around 100 meters on laptops.
• Connects various devices alike laptop, camera, mobile, mouse, etc.
![Page 7: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/7.jpg)
OBEX PROTOCOL• OBEX (abbreviation of Object Exchange) is a communication
protocol that facilitates the exchange of binary objects between devices.
• Helps to exchange business card, data, even applications.
• Initially OBEX was designed for infrared, latterly now has been adopted by BLUETOOTH also used over USB.
![Page 8: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/8.jpg)
Wanna try Bluejack? What do you Need?
• A BLUETOOTH enabled cell phone.
• A place with a lot of people having their BLUETOOTH device switched on.
• Good sense of humor.
![Page 9: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/9.jpg)
Search for a crowded placee.g. mall, bus stand etc. Put “on” your Bluetooth Search for devices with active
Bluetooth
…and enjoy the confused look. Let’s us give it a try…
![Page 10: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/10.jpg)
Open keypad
Options New contact
Hey dear..Uare
Bluejacked !!!
Type your desired message in the
name field.
Press Done
ContactOptions
Scroll down to “Send”
Choose “via Bluetooth”
Searching…
Phone will search for enabled devices
Select and send your message
Enjoy..!!!
![Page 11: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/11.jpg)
Enjoyed it…???
Yesss !!
![Page 12: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/12.jpg)
USAGE OF BLUEJACKING
• Advertisement
• Complimentary Messages
• Unethical usages
![Page 13: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/13.jpg)
Café/ restaurant/ pub
Where?
• Shopping mall• Train station• Cinema hall• Café/ Pub• Classroom
BUSY SHOPPING CENTER
c
Train Station
![Page 14: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/14.jpg)
CODE OF ETHICS
• Do not hack any device.
• Do not send any abusive messages.
• Do not threaten anyone.
• Must not reveal yourself to the victim.
![Page 15: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/15.jpg)
RELATED CONCEPTS
• BLUESNARFING
• BLUEBUGGING
![Page 16: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/16.jpg)
BLUESNARFING
• Stealing of information from victim’s Bluetooth device often between phone, laptops, PDA’s , etc.
• This allows access to a calendar, contact list, emails and sms and moreover some user can steal even images and private videos.
![Page 17: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/17.jpg)
BLUEBUGGING
• Form of Bluetooth Attack.
• Allows user to take control of a victim’s phone to call the user’s phone and can even send messages.
• Mechanism is being carried out using Laptop, with the use of powerful PDAs and mobile devices.
![Page 18: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/18.jpg)
MEASURES/PREVENTIONS
• TURN OFF BLUETOOTH device until when not in use.• Set the BLUETOOTH device to HIDDEN mode.
![Page 19: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/19.jpg)
CONCLUSION
BLUEJACKING is a technique by which we can interact with a new person and can bring a great change in the world of advertisement by sending about the products, enterprises etc. on the Bluetooth.
So we conclude that in future this technology becomes the key for advertisement to interact with the world.
![Page 20: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/20.jpg)
REFRENCES
• http://en.wikipedia.org/wiki/Bluejacking• http://www.seminarsonly.com/computer%20scie
nce/Bluejacking.php• http://www.slideshare.net• http://electronics.howstuffworks.com/bluejacking
.htm
![Page 21: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/21.jpg)
THANK YOU
![Page 22: Final bluejacking](https://reader035.vdocument.in/reader035/viewer/2022062310/586fd65c1a28ab18428b4ee1/html5/thumbnails/22.jpg)
ANY QUESTIONS ?