final bluejacking

22
SEMINAR ON BLUEJACKING PERSENTED BY- PAYAL - 13/CS/57 PRIYANKA PARIA - 13/CS/63 MANJEET KUMAR - 13/CS/46 GUIDED BY: Mrs. P.PRADHAN

Upload: rahul-raj

Post on 07-Jan-2017

96 views

Category:

Engineering


3 download

TRANSCRIPT

Page 1: Final bluejacking

SEMINAR ONBLUEJACKING

PERSENTED BY- PAYAL - 13/CS/57

PRIYANKA PARIA - 13/CS/63 MANJEET KUMAR - 13/CS/46

GUIDED BY: Mrs. P.PRADHAN

Page 2: Final bluejacking

CONTENTS1. INTRODUCTION2. BLUEJACKING CAN BE DONE IN..3. TECHNOLOGY USED4. BLUETOOTH TECHNOLOGY5. OBEX PROTOCOL6. WHAT DO YOU NEED?7. HOW TO BLUEJACK?8. USAGE OF BLUEJACKING?9. WHERE?10. CODE OF ETHICS11. CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING12. PREVENTIONS13. CONCLUSIONS

Page 3: Final bluejacking

INTRODUCTION

• Bluejacking is the sending of unsolicited messages over Bluetooth-enabled devices.

• Bluejacking do not remove or alter any data from

the device.

• The person who is being attacked does not know any information about the hacker except the name assigned to the hacker’s mobile phone.

Page 4: Final bluejacking

BLUEJACKING CAN BE DONE IN DEVICES LIKE

LAPTOPMOBILE

COMPUTER

PDA(personal digital assistant)

Page 5: Final bluejacking

TECHNOLOGY USED

• BLUETOOTH TECHNOLOGY.

• OBEX protocol.

Page 6: Final bluejacking

BLUETOOTH TECHNOLGY

• Short private area that uses radio frequencies to transmit data.

• Has a very limited range , usually 10 meters on mobile phones and around 100 meters on laptops.

• Connects various devices alike laptop, camera, mobile, mouse, etc.

Page 7: Final bluejacking

OBEX PROTOCOL• OBEX (abbreviation of Object Exchange) is a communication

protocol that facilitates the exchange of binary objects between devices.

• Helps to exchange business card, data, even applications.

• Initially OBEX was designed for infrared, latterly now has been adopted by BLUETOOTH also used over USB.

Page 8: Final bluejacking

Wanna try Bluejack? What do you Need?

• A BLUETOOTH enabled cell phone.

• A place with a lot of people having their BLUETOOTH device switched on.

• Good sense of humor.

Page 9: Final bluejacking

Search for a crowded placee.g. mall, bus stand etc. Put “on” your Bluetooth Search for devices with active

Bluetooth

…and enjoy the confused look. Let’s us give it a try…

Page 10: Final bluejacking

Open keypad

Options New contact

Hey dear..Uare

Bluejacked !!!

Type your desired message in the

name field.

Press Done

ContactOptions

Scroll down to “Send”

Choose “via Bluetooth”

Searching…

Phone will search for enabled devices

Select and send your message

Enjoy..!!!

Page 11: Final bluejacking

Enjoyed it…???

Yesss !!

Page 12: Final bluejacking

USAGE OF BLUEJACKING

• Advertisement

• Complimentary Messages

• Unethical usages

Page 13: Final bluejacking

Café/ restaurant/ pub

Where?

• Shopping mall• Train station• Cinema hall• Café/ Pub• Classroom

BUSY SHOPPING CENTER

c

Train Station

Page 14: Final bluejacking

CODE OF ETHICS

• Do not hack any device.

• Do not send any abusive messages.

• Do not threaten anyone.

• Must not reveal yourself to the victim.

Page 15: Final bluejacking

RELATED CONCEPTS

• BLUESNARFING

• BLUEBUGGING

Page 16: Final bluejacking

BLUESNARFING

• Stealing of information from victim’s Bluetooth device often between phone, laptops, PDA’s , etc.

• This allows access to a calendar, contact list, emails and sms and moreover some user can steal even images and private videos.

Page 17: Final bluejacking

BLUEBUGGING

• Form of Bluetooth Attack.

• Allows user to take control of a victim’s phone to call the user’s phone and can even send messages.

• Mechanism is being carried out using Laptop, with the use of powerful PDAs and mobile devices.

Page 18: Final bluejacking

MEASURES/PREVENTIONS

• TURN OFF BLUETOOTH device until when not in use.• Set the BLUETOOTH device to HIDDEN mode.

Page 19: Final bluejacking

CONCLUSION

BLUEJACKING is a technique by which we can interact with a new person and can bring a great change in the world of advertisement by sending about the products, enterprises etc. on the Bluetooth.

So we conclude that in future this technology becomes the key for advertisement to interact with the world.

Page 20: Final bluejacking

REFRENCES

• http://en.wikipedia.org/wiki/Bluejacking• http://www.seminarsonly.com/computer%20scie

nce/Bluejacking.php• http://www.slideshare.net• http://electronics.howstuffworks.com/bluejacking

.htm

Page 21: Final bluejacking

THANK YOU

Page 22: Final bluejacking

ANY QUESTIONS ?