Download - My seminar on bluejacking
![Page 1: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/1.jpg)
SEMINAR ON
BLUEJACKING
SUBMITTED BY-AKSHITA PILLAIMCA 2nd SEM
GUIDED BY:Dr. V.K.PATLESWARNIMA SHRIVASTAVA
![Page 2: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/2.jpg)
OUTLINES1. INTRODUCTION
2. BLUEJACKING CAN BE DONE IN..
3. TECHNOLOGY USED
4. BLUETOOTH TECHNOLOGY
5. OBEX PROTOCOL
6. REQUIREMENTS
7. HOW TO BLUEJACK?
8. USAGE OF BLUEJACKING
9. CODE OF ETHICS
10. CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING
11. PREVENTIONS
12. CONCLUSIONS
![Page 3: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/3.jpg)
INTRODUCTION
• Bluejacking is sending of unsolicited message over Bluetooth to Bluetooth-Enabled devices such as mobile phone, PDA or Laptops, by sending a vCard which typically contain a message in the name field via OBEX protocol.
• Bluejacking do not remove or alter any data from the device.
• The person who is being attacked does not know any information about the hacker except the name assigned to the hacker’s mobile phone.
![Page 4: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/4.jpg)
BLUEJACKING CAN BE DONE IN DEVICES LIKE
LAPTOP
MOBILECOMPUTER
PDA(personal digital assistant)
![Page 5: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/5.jpg)
TECHNOLOGY USED
• BLUETOOTH TECHNOLOGY.• OBEX protocol.
![Page 6: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/6.jpg)
BLUETOOTH TECHNOLGY• Short private area that uses radio frequencies to
transmit data.• Has a very limited range , usually 10 meters on
mobile phones and around 100 meters on laptops.• Connects various devices alike laptop , camera,
mobile, mouse, etc. in a PAN (Personal Area Network).
• Low power.• Low cost.
![Page 7: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/7.jpg)
EXAMPLE OF BLUETOOTH TECH.ALL ARE BLUETOOTH ENABLED DEVICES
CAR
CELL PHONE
COMPUTER
FRIEND CALLS YOU HOME PHONE
RINGS
Map automatically
Sent to pc Cell phone picked up Bluetooth signal from pc & automatically sent the data you want to transfer to computer
after 5 mins.
re-routed the call
Home phone picked up the Bluetooth signal from
your cell phone & automatically re-routed
the call
![Page 8: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/8.jpg)
OBEX PROTOCOL
• OBEX (abbreviation of Object Exchange) is a communication protocol that facilitates the exchange of binary objects between devices.
• Helps to exchange business card , data , even applications.
• Initially OBEX was designed for infrared, latterly now has been adopted by BLUETOOTH also used over USB.
![Page 9: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/9.jpg)
REQUIREMENTS
• A BLUETOOTH enabled cell phone.• A place with a lot of people having their
BLUETOOTH device switched on.
![Page 10: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/10.jpg)
HOW TO BLUEJACK
• Discover an area with a good number of mobile users as restro , mall, railway station, bank, classroom, etc.
• Create a new contact in our phonebook of our cell phone named something surprising as “Hey, you have been Bluejacked” or “Virus Received”
• Search for the available BLUETOOTH in your range to send the saved contact.
• The receiver is thereby distinguished by message tone or by discovering the owner’s facial expression.
![Page 11: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/11.jpg)
USAGE OF BLUEJACKING
• Shopping mall• Train station• Cinema hall• Café/ Pub• Classroom
BUSY SHOPPING CENTER
Train Station
Café/ restaurant/ pub
![Page 12: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/12.jpg)
CODE OF ETHICS
• Do not hack any device.• Do not send any abusive messages.• Do not threaten anyone.• Must not reveal yourself to the victim.• Do disable Bluetooth if you don’t want to be
BLUEJACKED.
![Page 13: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/13.jpg)
RELATED CONCEPTS
• BLUESNARFING• BLUEBUGGING
![Page 14: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/14.jpg)
BLUESNARFING
• Stealing of information from victim’s Bluetooth device often between phone, laptops, PDA’s , etc.
• This allows access to a calendar, contact list, emails and sms and moreover some user can steal even images and private videos.
![Page 15: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/15.jpg)
BLUEBUGGING
• Form of Bluetooth Attack.• Allows user to take control of a victim’s phone to call
the user’s phone and can even send messages. • Mechanism is being carried out using Laptop, with
the use of powerful PDAs and mobile devices.
![Page 16: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/16.jpg)
MEASURES/PREVENTIONS
• TURN OFF BLUETOOTH device until when not in use.
• Set the BLUETOOTH device to HIDDEN mode.
![Page 17: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/17.jpg)
CONCLUSION
BLUEJACKING is a technique by which we can interact with a new person and can bring a great change in the world of advertisement by sending about the products , enterprises etc. on the Bluetooth.
So we conclude that in future this technology becomes the key for advertisement to interact with the world.
![Page 18: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/18.jpg)
REFRENCES
• http://en.wikipedia.org/wiki/Bluejacking• http://www.seminarsonly.com/computer%20s
cience/Bluejacking.php• http://www.slideshare.net• http://electronics.howstuffworks.com/bluejac
king.htm
![Page 19: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/19.jpg)
THANK YOU. . .
![Page 20: My seminar on bluejacking](https://reader034.vdocuments.us/reader034/viewer/2022050720/549ac84eb4795929098b45c1/html5/thumbnails/20.jpg)
QUESTIONS ?