Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such. as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in. the name field (i.e for bluedating or bluechat) to another Bluetooth enabled device via the OBEX. pr...
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such. as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in. the name field (i.e for bluedating or bluechat) to another Bluetooth enabled device via the OBEX. protocol.
The information in this slide is not mine but it is adapted from various search engines and websites like google, yahoo, twitter etc. The theme of the slides is taken from slidesgo. you can find this theme under the category technology. Hope you guys like it and it helps you.
TABLE OF CONTENTS 01 INTRODUCTION 02 BLUETOOTH 03 BLUEJACKING 04 CONCLUSION
INTRODUCTION 01 Sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers via the OBEX protocol is Bluejacking.
BLUETOOTH Bluetooth is a wireless technology that provides short range communications. Bluetooth is used for sending messages or connecting to remote headsets or various other devices.
Advantages and disadvantages of bluetooth It avoids interference from other wireless technologies and is very cheap to use. Also free if it’s already installed in device. The technology is also adopted in many products such as headsets, in car system, printer, webcam, GPS, keyboard, mouse etc. Battery drains easily, it is not secure and works very slow.
BLUEJACKING 02 Bluejacking is a hacking method that involves sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices.
ORIGIN Bluejacking was reportedly first carried out by a Malaysian IT consultant named Ajack who used his phone to advertise Sony Ericsson. He also invented the name, which he claims is an amalgam of Bluetooth and Ajack, his username on Esato, a Sony Ericsson fan online forum. Jacking is, however, an extremely common shortening of hijack, the act of taking over something. BLUEJACKED
OBEX PROTOCOL 3 OBJECT EXCHANGE is a transfer protocol that defines data objects and a communication protocol for devices that can exchange data and commands in a resource-sensitive standardized fashion.
PROTOCOLS OBEX PUSH Used for transferring file OBEX FILE TRANSFER Used to store and retrieve files PHONEBOOK ACCESS Similar to file transfer, but uses a target. IRMC Used to exchange phone books entries
A VersitCard is an electronic business (or personal) card and also the name of an industry specification for the kind of communication exchange that is done on business or personal cards. Vcard Vcard
How to Bluejack? 04 Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled. You will need to read the handbook of the particular phone (or PDA etc.) that you have but somewhere in the Menu item you will find the item that enables and disabled Bluetooth.
Steps to bluejack Select an area with plenty of mobile users. Go to contacts in your Address Book. Step 1 Step 2
Steps to bluejack Create a new contact. Write the message in the name section. Step 3 Step 4
Steps to bluejack Save the new Contact Choose “Send via bluetooth” Step 5 Step 6
Steps to bluejack Choose one phone and send the contact You will get the message "card sent" and then listen for the SMS message tone of your victim's phone. Step 7 Step 8
A PICTURE IS WORTH A THOUSAND WORDS Look out for the shock look in your victim.
MEETING POINT BLUEJACKING SOFTWARES FREEJACK EASYJACKING MAGIC BLUE HACK BLUESPAM PROXIMITY MAIL
Bluejacking can be used in many fields and for various purposes. The main fields where the bluejacking is used are as follows: - Busy shopping centre - Train Station - High Street - On Trains and Buses - Movie Theatres - Cafés and Restaurant - Shopping Centres - Electronics Shop USAGE 18
PREVENTIVE MEASURE TURNING OFF turn your Bluetooth device off in certain public areas HIDDING Set the Bluetooth device to hidden IGNORING Ignore bluejacking messages by refusing or deleting them
Users can equip their gadgets with mobile security products such as Symantec Mobile Security Suite 5.0, which include antivirus, firewall, anti-SMS spam and data encryption technologies, that are easy to deploy, manage and maintain. The layered security in Symantec Mobile Security Suite 5.0, would help IT administrators to provide layered security in order to mitigate the unique security risks of mobile devices. TOOLS TO PREVENT 20
The main goal of Security Testing is to identify the threats in the system and measure its potential vulnerabilities, so the threats can be encountered, and the system does not stop functioning or can not be exploited. It also helps in detecting all possible security risks in the system and helps developers to fix the problems through coding. In bluejacking, security hackers can use a security tool like Intruder for identifying threats. Intruder is an enterprise-grade vulnerability scanner that is easy to use. Providing intelligently prioritized results as well as proactive scans for the latest threats, Intruder helps save time and keeps businesses of all sizes safe from hackers. SECURITY TESTING 21
Bluejackers will only send messages/pictures. They will never try to 'hack' a device for the purpose of copying or modifying any files on any device or upload. CODE OF ETHICS 1 If no interest is shown by the recipient after 2 messages the bluejacker will desist and move on. • The Bluejacker will restrict their activity to 10 messages maximum unless in exceptional circumstances If a Bluejacker is caught 'in the act' he/she will be as co-operative as possible and not hide any details of their activity. 2 3
We conclude that in future this technology can become the key for advertising and to interact with new people, with the world and to get the location messages on the phone when we are out somewhere. Because of its low cost and power consumption this technology has a great future ahead. CONCLUSION