27
SUBMITED TO:- Mr. Deepak Tiwari Miss. Bhagyashree Gurjar SUBMITED BY:- NiharikaMundra

Bluejacking by Niharika Mundra

  • Upload
    gitlu

  • View
    200

  • Download
    6

Embed Size (px)

Citation preview

Page 1: Bluejacking  by Niharika Mundra

SUBMITED TO:-Mr. Deepak TiwariMiss. Bhagyashree Gurjar

SUBMITED BY:-NiharikaMundra

Page 2: Bluejacking  by Niharika Mundra
Page 3: Bluejacking  by Niharika Mundra

CONTENTS INTRODUCTION ORIGIN OF BLUEJACK SOFTWARE TOOLS HOW TO BLUEJACK RELATED CONCEPTS CODE OF ETHICS USAGE OF BLUEJACKING ADVANTAGES DISADVANTAGES CONCLUSION

Page 4: Bluejacking  by Niharika Mundra

WHAT IS BLUEJACKING

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,etc.

Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.

Page 5: Bluejacking  by Niharika Mundra
Page 6: Bluejacking  by Niharika Mundra

ORIGIN OF BLUEJACKING This bluejack phenomenon started after a

Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.

Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia 7650.

Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650 in the vicinity, he created a new contact and filled in the first name with ‘Buy Ericsson!' and sent a business card to the Nokia phone.

Page 7: Bluejacking  by Niharika Mundra
Page 8: Bluejacking  by Niharika Mundra

SOFTWARE TOOLS Bluespam:- BlueSpam searches for all discoverable

Bluetooth devices and sends a file to them (spams them) if they support OBEX.

Meeting point:- Meeting point is the perfect tools to search for Bluetooth devices. Combine it with any bluejacking tools and have lots of fun. This software is compatible with pocket PC, Windows.

Freejack:- Freejack is compatible to java phone like Nokia N-series

Easyjacking (eJack):- Allows sending of text Messages to other Bluetooth enables devices.

Page 9: Bluejacking  by Niharika Mundra

HOW TO BLUEJACK

Your phone or PDA will start to search the airwaves for other devices within range.

If you are lucky you will see a list of them appear, or it will say that it cannot find any.

If the latter happens then relocate to another crowd or wait a while and try again.

If you have a list of found devices then let the fun begin.

Page 10: Bluejacking  by Niharika Mundra
Page 11: Bluejacking  by Niharika Mundra
Page 12: Bluejacking  by Niharika Mundra
Page 13: Bluejacking  by Niharika Mundra
Page 14: Bluejacking  by Niharika Mundra
Page 15: Bluejacking  by Niharika Mundra
Page 16: Bluejacking  by Niharika Mundra
Page 17: Bluejacking  by Niharika Mundra

RELATED CONCEPTS

Bluesnarfing.

Bluebugging.

Bluecasting.

Page 18: Bluejacking  by Niharika Mundra

BLUESNARFING

It is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops and laptops. It is a type of hacking.

Even if your device is hidden bluesnarfing can also be done.

Page 19: Bluejacking  by Niharika Mundra

BLUEBUGGING It is a form of Bluetooth

attack. Allows the user to take control of a victim's phone to call the user's phone. This means that the bluebug user can simply listen to any conversation his victim is having in real life.

Page 20: Bluejacking  by Niharika Mundra

BLUECASTING

It is generally provisioned by Bluetooth Kiosk, a physical server provisioning the digital media over Bluetooth to interested device.

In some temples which offer ringtone , wallpapers of god use Bluecasting.

Many companies also use to advertise various offers by Bluecasting

Page 21: Bluejacking  by Niharika Mundra

CODE OF ETHICS

Do not hack any device. Don't send abusive messages. Don't threaten anyone . Don't put your personal information in a

BlueJack message. Do disable Bluetooth if you don't want to be

BlueJacked. If bluejacker is caught 'in the act' he/she will be

as co-operative as possible and not hide any details of their activity.

Page 22: Bluejacking  by Niharika Mundra

USAGE OF BLUEJACKING Bluejacking can be used in many

fields and for various purposes like in the busy shopping centre,railway station, high street, cinema, café/restaurant/pub,etc.

The main use of bluejacking tools or bluejacking is in advertising purpose.

Experimental results show that the system provides a viable solution for realizing permission-based mobile advertising.

Page 23: Bluejacking  by Niharika Mundra

ADVANTAGES

Usually, a bluejacker will only send a text message, but with modern phones it’s possible to send images or sounds as well.

We can easily transfer data from mobile to laptop.

We can transfer data from mobile to mobile in a short period.

Page 24: Bluejacking  by Niharika Mundra

DISADVANTAGES

Bluejacking is also confused with Bluesnarfing which is the way in which mobile phones are illegally hacked via Bluetooth.

Virus attacks.

Page 25: Bluejacking  by Niharika Mundra

CONCLUION

Bluejacking is a technique by which we can interact with new people and has ability to revolutionerise market by sending advertisement about the product, enterprise etc. on the Bluetooth configured mobile phone so that the people get aware about them by seeing them on the phone.

Page 26: Bluejacking  by Niharika Mundra

REFRECES

http.//www.seminaronly.com/computer%20science/bluejacing.php

http.//www.bluejackingtools.com/ http.//www.wikipedia.org/wiki/bluejack http.//www.webopedia.com/TERM/B/bluejacki

ng.html

Page 27: Bluejacking  by Niharika Mundra

Thank You