You are on page 1of 20

BLUEJACKING

Guided by: Presented by:


PROF. SONALI GANGURDE HARSHADA KOLI
(Student of 3rd Year C.M)
11/14/2019
2
CONTENTS
 Introduction to Bluejacking
 Origin of Bluejacking
 Technology Used
 Requirements
 Architecture of Bluejacking
 Process of Bluejacking
 Software tools for Bluejacking
 Usage of Bluejacking
 Merits and Demerits
 Related Concepts
 Code of Ethics
 Future Aspects
 Conclusion
11/14/2019
3
WHAT IS BLUEJACKING
TECHNOLOGY??
Sending of unsolicited messages over Bluetooth to
Bluetooth-enabled devices.
Exploits a basic Bluetooth feature

11/14/2019
4
ORIGIN OF BLUEJACKING

Started after a Malaysian IT consultant named “Ajack”

Ajack told about Ericsson cellphone

Ajack did a Bluetooth discovery

11/14/2019
5
TECHNOLOGY USED

Bluetooth Technology
vCards
OBEX Protocol

11/14/2019
6
BLUETOOTH TECHNOLOGY

Wireless Technology
Connects numerous devices
Distance of data transmission is small
Eradicates use of cords, cables, adapters
Communication is done via RF link
Ability to be full duplex and handle both data and
voice transmission simultaneously
11/14/2019
7
VCARDS

Also known as VCF


File format standard
Electronic business card
Can contain name and address information, telephone
numbers, email addresses etc.
Used as data interchange format

11/14/2019
8
OBEX PROTOCOL

Stands for Object Exchange

Protocol for wireless exchange of data

Built in various different kinds of hardware

Session layer protocol


11/14/2019
9
REQUIREMENTS

Bluetooth enabled cell phone


People in crowded places having their Bluetooth
device switched on

11/14/2019
10 ARCHITECTURE OF BLUEJACKING

Pinocet
• Device find each other and form a network
• Pinocet is a basic unit with upto 8 nodes
• All communication between master and slaves
• Pinocet is a centralized TDM system

11/14/2019
11
PINOCETS

11/14/2019
12
PROCESS OF BLUEJACKING

Go to contacts in the phone book or address book


Create a new contact
Enter the message into the name part
Save the new contact
Choose “send via bluetooth”
Choose one phone and send the contact
You will get the message “card sent” and then listen for
the SMS message tone of your victim’s phone

11/14/2019
13
SOFTWARE TOOLS FOR
BLUEJACKING
Bluespam
Meeting Point
Freejack
Easyjacking
Proximitymail

11/14/2019
14
USAGE

 Busy Shopping Centres


 Starbucks
 Train Station
 High Street
 On a train/bus
 Cinema
 Café/restaurant/pub
 Mobile phone shop
 Electronics shop(eg. Dixons)
11/14/2019
15
MERITS & DEMERITS

 Merits:
• People can send any image or sound
• Easy transfer of data in a short period
• Can enjoy music by wireless headphone
 Demerits:
• Bluejacking confused with bluesnarfing
• Virus attacks
• Definitely doesn’t work on blueberry, iPhones or iPads

11/14/2019
16
RELATED CONCEPTS

Bluesnarfing: Unauthorised access of information from a


wireless device through a bluetooth connection

Bluecasting: Physical server provisioning the digital


media over Bluetooth to interested devices

Bluebugging: Form of Bluetooth attack

11/14/2019
17
CODE OF ETHICS

Do not hack any device


Do not send abusive messages
Don’t threaten anyone
Don’t put your personal information in a bluejack
message
Don’t reveal yourself to the victim
Do disable bluetooth if you don’t want to be
bluejacked 11/14/2019
18
FUTURE ASPECTS

Act as major sale tool


Because of its low cost and power consumption this
technology has a great future ahead
Learn future preferences by placing options like “more
ads like this” and “less ads like this” in each
advertisement.

11/14/2019
19
CONCLUSION

Because of its low cost and power consumption this


technology has a great future ahead
Can easily transfer the data on the spot in fraction of
seconds without using cardreaders etc.

11/14/2019
20

THANK YOU…

11/14/2019

You might also like