final bluejacking

Post on 07-Jan-2017

96 Views

Category:

Engineering

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

SEMINAR ONBLUEJACKING

PERSENTED BY- PAYAL - 13/CS/57

PRIYANKA PARIA - 13/CS/63 MANJEET KUMAR - 13/CS/46

GUIDED BY: Mrs. P.PRADHAN

CONTENTS1. INTRODUCTION2. BLUEJACKING CAN BE DONE IN..3. TECHNOLOGY USED4. BLUETOOTH TECHNOLOGY5. OBEX PROTOCOL6. WHAT DO YOU NEED?7. HOW TO BLUEJACK?8. USAGE OF BLUEJACKING?9. WHERE?10. CODE OF ETHICS11. CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING12. PREVENTIONS13. CONCLUSIONS

INTRODUCTION

• Bluejacking is the sending of unsolicited messages over Bluetooth-enabled devices.

• Bluejacking do not remove or alter any data from

the device.

• The person who is being attacked does not know any information about the hacker except the name assigned to the hacker’s mobile phone.

BLUEJACKING CAN BE DONE IN DEVICES LIKE

LAPTOPMOBILE

COMPUTER

PDA(personal digital assistant)

TECHNOLOGY USED

• BLUETOOTH TECHNOLOGY.

• OBEX protocol.

BLUETOOTH TECHNOLGY

• Short private area that uses radio frequencies to transmit data.

• Has a very limited range , usually 10 meters on mobile phones and around 100 meters on laptops.

• Connects various devices alike laptop, camera, mobile, mouse, etc.

OBEX PROTOCOL• OBEX (abbreviation of Object Exchange) is a communication

protocol that facilitates the exchange of binary objects between devices.

• Helps to exchange business card, data, even applications.

• Initially OBEX was designed for infrared, latterly now has been adopted by BLUETOOTH also used over USB.

Wanna try Bluejack? What do you Need?

• A BLUETOOTH enabled cell phone.

• A place with a lot of people having their BLUETOOTH device switched on.

• Good sense of humor.

Search for a crowded placee.g. mall, bus stand etc. Put “on” your Bluetooth Search for devices with active

Bluetooth

…and enjoy the confused look. Let’s us give it a try…

Open keypad

Options New contact

Hey dear..Uare

Bluejacked !!!

Type your desired message in the

name field.

Press Done

ContactOptions

Scroll down to “Send”

Choose “via Bluetooth”

Searching…

Phone will search for enabled devices

Select and send your message

Enjoy..!!!

Enjoyed it…???

Yesss !!

USAGE OF BLUEJACKING

• Advertisement

• Complimentary Messages

• Unethical usages

Café/ restaurant/ pub

Where?

• Shopping mall• Train station• Cinema hall• Café/ Pub• Classroom

BUSY SHOPPING CENTER

c

Train Station

CODE OF ETHICS

• Do not hack any device.

• Do not send any abusive messages.

• Do not threaten anyone.

• Must not reveal yourself to the victim.

RELATED CONCEPTS

• BLUESNARFING

• BLUEBUGGING

BLUESNARFING

• Stealing of information from victim’s Bluetooth device often between phone, laptops, PDA’s , etc.

• This allows access to a calendar, contact list, emails and sms and moreover some user can steal even images and private videos.

BLUEBUGGING

• Form of Bluetooth Attack.

• Allows user to take control of a victim’s phone to call the user’s phone and can even send messages.

• Mechanism is being carried out using Laptop, with the use of powerful PDAs and mobile devices.

MEASURES/PREVENTIONS

• TURN OFF BLUETOOTH device until when not in use.• Set the BLUETOOTH device to HIDDEN mode.

CONCLUSION

BLUEJACKING is a technique by which we can interact with a new person and can bring a great change in the world of advertisement by sending about the products, enterprises etc. on the Bluetooth.

So we conclude that in future this technology becomes the key for advertisement to interact with the world.

REFRENCES

• http://en.wikipedia.org/wiki/Bluejacking• http://www.seminarsonly.com/computer%20scie

nce/Bluejacking.php• http://www.slideshare.net• http://electronics.howstuffworks.com/bluejacking

.htm

THANK YOU

ANY QUESTIONS ?

top related