14
Presented Presented By By A. Mercy A. Mercy S. Asvitha S. Asvitha (II B.Sc. (II B.Sc. [CS])

Blue jacking mercy

Embed Size (px)

DESCRIPTION

This is useful to know about the basics of Blue jacking.

Citation preview

Page 1: Blue jacking mercy

Presented ByPresented By

A. MercyA. MercyS. AsvithaS. Asvitha

(II B.Sc.[CS])(II B.Sc.[CS])

Page 2: Blue jacking mercy

Introduction

Page 3: Blue jacking mercy

“Ajack” posted a comment on a mobile phone forum.

Ajack told IT Web that he used his Ericsson cell phone in a bank to send a message to someone with a Nokia 7650.

Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650, he created a new contact and filled in the first name with ‘Buy Ericsson! and sent a business card to the Nokia phone.

Page 4: Blue jacking mercy

To make sure that Bluetooth is enabled.

To read the handbook of the particular phone (or PDA etc).

Phone or PDA will start to search the airwaves for other devices within range.

To see a list of them appear, or it will say that it cannot find any.

Page 5: Blue jacking mercy

First press the 5-way joystick down Then choose options

Then choose "New contact" Then in the first

line choose your desired messageThen press done

Then go to the contact

Then press options

Then scroll down to send

Then choose "Via Bluetooth" Then the phone will

search for enabled Devices.Then select & send

your message

Page 6: Blue jacking mercy

software tools

Blue spam:

Searches for all discoverable Bluetooth devices.Sends a file to them if they support OBEX.

Meeting point:

Perfect tool to search for bluetooth devices. This software is compatible with pocket pc, windows.

Free jack:

Compatible to java phone like Nokia N-series.

Easy jacking (eJack):Allows sending of text Messages to other Bluetooth enabled

devices.

Blue spam:

Searches for all discoverable Bluetooth devices.Sends a file to them if they support OBEX.

Meeting point:

Perfect tool to search for bluetooth devices. This software is compatible with pocket pc, windows.

Free jack:

Compatible to java phone like Nokia N-series.

Easy jacking (eJack):Allows sending of text Messages to other Bluetooth enabled

devices.

Page 7: Blue jacking mercy

Usage Of Bluejacking

BUSY

SHOPPING

CENTER Railway

StationCafé/

restaurant/

pubOn a train/

tube/ busHigh Street

Busy shopping centre Railway Station Café/ restaurant/ pub On a train/ tube/ bus High Street Cinema Mobile phone shop Electronics shop

Page 8: Blue jacking mercy

Architecture

Piconet:

• The devices find each other and form a network called “ piconetpiconet ” spontaneously.

• A piconet is a basic unit with up to 8 nodes.

• All communication are between master and slaves.

• Master controls clock and decides the time slot for the device.

• In a piconet , there can be up to 255 parked nodes.

(i) Bluejacker - who carry out the bluejack.(ii) Victim – Who receive the bluejack.

Page 9: Blue jacking mercy

Code of Ethics

Don't send abusive messages.

Don't threaten anyone.

Don't put your personal information in a Blue Jack message.

Don't reveal yourself to the 'victim'.

Do disable Bluetooth if you don't want to be Blue Jacked.

Page 10: Blue jacking mercy

Related ConceptsRelated Concepts

Bluesnarfing: The theft of information form a wireless device through a Bluetooth connection. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to ‘Blue jacking’.

Bluecasting: Provision of any small digital media to suitable media provisioning enabled devices over Bluetooth via the OBEX protocol.

Bluebugging:

Blue bugging is a form of Bluetooth attack. Allows the user to take control of a victim’s

phone to call the user’s phone

Page 11: Blue jacking mercy

Earlier issue:

Promotes an environment that puts consumer devices at greater risk. Complete memory contents of some mobile phones can be accessed

by a previously trusted paired device. Phonebook and calendar can be obtained without owner’s knowledge.

Present Scenario:

Primarily occurs in public spaces. Security issues previously involved with blue jacking has been resolved. In order for information to be duplicated, the devices would have to

be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired.

Page 12: Blue jacking mercy

Control Measures:

Warning:

Turn off your Bluetooth device when not in use.

Never try to ‘hack’ a device. Is an offence under the “computer misuse act

1990”.

Page 13: Blue jacking mercy

Conclusion

Blue jacking is a technique by which we can interact with new people.

It has ability to bring a revolution market by sending advertisement.

Page 14: Blue jacking mercy

Queries?