Date post: | 07-Jan-2017 |
Category: |
Engineering |
Upload: | rahul-raj |
View: | 95 times |
Download: | 3 times |
SEMINAR ONBLUEJACKING
PERSENTED BY- PAYAL - 13/CS/57
PRIYANKA PARIA - 13/CS/63 MANJEET KUMAR - 13/CS/46
GUIDED BY: Mrs. P.PRADHAN
CONTENTS1. INTRODUCTION2. BLUEJACKING CAN BE DONE IN..3. TECHNOLOGY USED4. BLUETOOTH TECHNOLOGY5. OBEX PROTOCOL6. WHAT DO YOU NEED?7. HOW TO BLUEJACK?8. USAGE OF BLUEJACKING?9. WHERE?10. CODE OF ETHICS11. CONCEPTS i.e. BLUESNARFFING & BLUEBUGGING12. PREVENTIONS13. CONCLUSIONS
INTRODUCTION
• Bluejacking is the sending of unsolicited messages over Bluetooth-enabled devices.
• Bluejacking do not remove or alter any data from
the device.
• The person who is being attacked does not know any information about the hacker except the name assigned to the hacker’s mobile phone.
BLUEJACKING CAN BE DONE IN DEVICES LIKE
LAPTOPMOBILE
COMPUTER
PDA(personal digital assistant)
TECHNOLOGY USED
• BLUETOOTH TECHNOLOGY.
• OBEX protocol.
BLUETOOTH TECHNOLGY
• Short private area that uses radio frequencies to transmit data.
• Has a very limited range , usually 10 meters on mobile phones and around 100 meters on laptops.
• Connects various devices alike laptop, camera, mobile, mouse, etc.
OBEX PROTOCOL• OBEX (abbreviation of Object Exchange) is a communication
protocol that facilitates the exchange of binary objects between devices.
• Helps to exchange business card, data, even applications.
• Initially OBEX was designed for infrared, latterly now has been adopted by BLUETOOTH also used over USB.
Wanna try Bluejack? What do you Need?
• A BLUETOOTH enabled cell phone.
• A place with a lot of people having their BLUETOOTH device switched on.
• Good sense of humor.
Search for a crowded placee.g. mall, bus stand etc. Put “on” your Bluetooth Search for devices with active
Bluetooth
…and enjoy the confused look. Let’s us give it a try…
Open keypad
Options New contact
Hey dear..Uare
Bluejacked !!!
Type your desired message in the
name field.
Press Done
ContactOptions
Scroll down to “Send”
Choose “via Bluetooth”
Searching…
Phone will search for enabled devices
Select and send your message
Enjoy..!!!
Enjoyed it…???
Yesss !!
USAGE OF BLUEJACKING
• Advertisement
• Complimentary Messages
• Unethical usages
Café/ restaurant/ pub
Where?
• Shopping mall• Train station• Cinema hall• Café/ Pub• Classroom
BUSY SHOPPING CENTER
c
Train Station
CODE OF ETHICS
• Do not hack any device.
• Do not send any abusive messages.
• Do not threaten anyone.
• Must not reveal yourself to the victim.
RELATED CONCEPTS
• BLUESNARFING
• BLUEBUGGING
BLUESNARFING
• Stealing of information from victim’s Bluetooth device often between phone, laptops, PDA’s , etc.
• This allows access to a calendar, contact list, emails and sms and moreover some user can steal even images and private videos.
BLUEBUGGING
• Form of Bluetooth Attack.
• Allows user to take control of a victim’s phone to call the user’s phone and can even send messages.
• Mechanism is being carried out using Laptop, with the use of powerful PDAs and mobile devices.
MEASURES/PREVENTIONS
• TURN OFF BLUETOOTH device until when not in use.• Set the BLUETOOTH device to HIDDEN mode.
CONCLUSION
BLUEJACKING is a technique by which we can interact with a new person and can bring a great change in the world of advertisement by sending about the products, enterprises etc. on the Bluetooth.
So we conclude that in future this technology becomes the key for advertisement to interact with the world.
REFRENCES
• http://en.wikipedia.org/wiki/Bluejacking• http://www.seminarsonly.com/computer%20scie
nce/Bluejacking.php• http://www.slideshare.net• http://electronics.howstuffworks.com/bluejacking
.htm
THANK YOU
ANY QUESTIONS ?