BLUEJACKING
Guided by: Presented by:
PROF. SONALI GANGURDE HARSHADA KOLI
(Student of 3rd Year C.M)
11/14/2019
2
CONTENTS
Introduction to Bluejacking
Origin of Bluejacking
Technology Used
Requirements
Architecture of Bluejacking
Process of Bluejacking
Software tools for Bluejacking
Usage of Bluejacking
Merits and Demerits
Related Concepts
Code of Ethics
Future Aspects
Conclusion
11/14/2019
3
WHAT IS BLUEJACKING
TECHNOLOGY??
Sending of unsolicited messages over Bluetooth to
Bluetooth-enabled devices.
Exploits a basic Bluetooth feature
11/14/2019
4
ORIGIN OF BLUEJACKING
Started after a Malaysian IT consultant named “Ajack”
Ajack told about Ericsson cellphone
Ajack did a Bluetooth discovery
11/14/2019
5
TECHNOLOGY USED
Bluetooth Technology
vCards
OBEX Protocol
11/14/2019
6
BLUETOOTH TECHNOLOGY
Wireless Technology
Connects numerous devices
Distance of data transmission is small
Eradicates use of cords, cables, adapters
Communication is done via RF link
Ability to be full duplex and handle both data and
voice transmission simultaneously
11/14/2019
7
VCARDS
Also known as VCF
File format standard
Electronic business card
Can contain name and address information, telephone
numbers, email addresses etc.
Used as data interchange format
11/14/2019
8
OBEX PROTOCOL
Stands for Object Exchange
Protocol for wireless exchange of data
Built in various different kinds of hardware
Session layer protocol
11/14/2019
9
REQUIREMENTS
Bluetooth enabled cell phone
People in crowded places having their Bluetooth
device switched on
11/14/2019
10 ARCHITECTURE OF BLUEJACKING
Pinocet
• Device find each other and form a network
• Pinocet is a basic unit with upto 8 nodes
• All communication between master and slaves
• Pinocet is a centralized TDM system
11/14/2019
11
PINOCETS
11/14/2019
12
PROCESS OF BLUEJACKING
Go to contacts in the phone book or address book
Create a new contact
Enter the message into the name part
Save the new contact
Choose “send via bluetooth”
Choose one phone and send the contact
You will get the message “card sent” and then listen for
the SMS message tone of your victim’s phone
11/14/2019
13
SOFTWARE TOOLS FOR
BLUEJACKING
Bluespam
Meeting Point
Freejack
Easyjacking
Proximitymail
11/14/2019
14
USAGE
Busy Shopping Centres
Starbucks
Train Station
High Street
On a train/bus
Cinema
Café/restaurant/pub
Mobile phone shop
Electronics shop(eg. Dixons)
11/14/2019
15
MERITS & DEMERITS
Merits:
• People can send any image or sound
• Easy transfer of data in a short period
• Can enjoy music by wireless headphone
Demerits:
• Bluejacking confused with bluesnarfing
• Virus attacks
• Definitely doesn’t work on blueberry, iPhones or iPads
11/14/2019
16
RELATED CONCEPTS
Bluesnarfing: Unauthorised access of information from a
wireless device through a bluetooth connection
Bluecasting: Physical server provisioning the digital
media over Bluetooth to interested devices
Bluebugging: Form of Bluetooth attack
11/14/2019
17
CODE OF ETHICS
Do not hack any device
Do not send abusive messages
Don’t threaten anyone
Don’t put your personal information in a bluejack
message
Don’t reveal yourself to the victim
Do disable bluetooth if you don’t want to be
bluejacked 11/14/2019
18
FUTURE ASPECTS
Act as major sale tool
Because of its low cost and power consumption this
technology has a great future ahead
Learn future preferences by placing options like “more
ads like this” and “less ads like this” in each
advertisement.
11/14/2019
19
CONCLUSION
Because of its low cost and power consumption this
technology has a great future ahead
Can easily transfer the data on the spot in fraction of
seconds without using cardreaders etc.
11/14/2019
20
THANK YOU…
11/14/2019