www.studymafia.org
Submitted To: Submitted By:
www.studymafia.org www.studymafia.org
Seminar
On
Bluejacking
 Introduction
 Bluejacking Technology
 Architecture
 Technical Features
 How to Bluejack
 Usage of bluejacking
 Related concepts
 Future aspects
 Conclusion
 Reference
• Bluejacking
– Sending of unsolicited messages over Bluetooth to
Bluetooth-enabled devices such as mobile phones,
PDAs or laptop computers via the OBEX protocol.
• Origin
– Started after a Malaysian IT consultant named
“Ajack” posted a comment on a mobile phone forum.
 Bluetooth technology
 vCard
 OBEX protocol
• Short range wireless LAN
• Connects numerous devices of different functions like telephones,
notebooks, computers, digital cameras etc. , in Personal Area
Network (PAN).
• Three areas - Data and Voice access points, Cable replacement, and
Ad hoc networking.
• Supports point - to - point as well as multi-point.
• Low power
• Low cost single chip radio – feasible
Piconet
• The devices find each other and form a network called “
piconet ” spontaneously.
• A piconet is a basic unit with up to 8 nodes, one of which
is a master and up to seven active slave nodes within a
maximum distance of 10 meters.
• All communication between master and slaves.
• Piconet is a centralized TDM system.
• Master controls clock and decides the time slot for the
device.
• In a piconet , there can be up to 255 parked nodes.
• Master switches to low power state and parked node wait
for beacon from master.
Connection Type
Spread Spectrum (Frequency Hopping)
& Time Division Duplex (1600
hops/sec)
Spectrum
2.4 GHz ISM Open Band (79 MHz of
spectrum = 79 channels)
Modulation Gaussian Frequency Shift Keying
Transmission Power 1 mw – 100 mw
Data Rate 1 Mbps
Range 30 ft
Supported Stations 8 devices
Data Security –Authentication
Key
128 bit key
Data Security –Encryption Key 8-128 bits (configurable)
Module size 9 x 9 mm
 Classification of devices on the basis of Power
dissipated & corresponding maximum Range.
POWER RANGE
CLASS I 20 dBm 100 m
CLASS II 0-4 dBm 10 m
CLASS III 0 dBm 1 m
• Mobile
• Personal computers
• Software tools
– Bluespam
• Searches for all discoverable Bluetooth devices and
sends a file to them (spam's them) if they support
OBEX.
• By default a small text will be send.
 Customize the message that should be send you need
a palm with an SD/MMC card, then you create the
directory /PALM/programs/BlueSpam/ Send/ and put
the file you would like to in into this directory. Activity is
logged to /PALM/programs/BlueSpam/Log/log.txt.
› Mobiluck
› Meeting point
 Is compatible with pocket PC, palm, Windows.
› Proximity mail
› Easyjack
› Freejack
 Freejack is compatible to java phone like Nokia N-
series.
 Busy shopping centre
 Starbucks
 Train Station
 High Street
 On a train/ tube/ bus
 Cinema
 Café/ restaurant/ pub
 Mobile phone shop
 Electronics shop (e.g. Dixons)
0 5 10 15 20 25 30 35
Public transportation
Stores ans shopping malls
Restaurants
Bars
Cafés
Home
Places where bluejack occures
 Advertisement
 Marketing opportunity
› Viral communication
› Community activities
› Location based service
 Do not hack any device
 Don't send abusive messages
 Don't threaten anyone
 Don't put your personal information in a BlueJack message
 Don't reveal yourself to the 'victim'
 Do disable Bluetooth if you don't want to be BlueJacked
 Bluesnarfing
 Bluecasting
 Bluebugging
 Is the unauthorized access of information
from a wireless device through a Bluetooth
connection, often between phones,
desktops, laptops, and PDAs.
 Even if your device is hidden bluesnarfing
can also be done.
 Provision of any small digital media to
suitable media provisioning enabled devices
over Bluetooth via the OBEX protocol.
 Form of Bluetooth attack.
 Allows the user to take control of a victim's
phone to call the user's phone.
 Earlier issue
 Promotes an environment that puts consumer devices
at greater risk.
 Complete memory contents of some mobile phones
can be accessed by a previously trusted paired
device.
 Phonebook and calendar can be obtained without
owners knowledge.
 Present Scenario
 primarily occurs in public spaces
 Security issues previously involved with
bluejacking has been resolved.
 In order for information to be duplicated, the devices
would have to be paired. Bluejacking does not require
a password to be entered and therefore the two
devices are not paired
 Turn off your Bluetooth device until you need
to communicate with another user.
 Buy an E2X bag.
› It blocks all transmissions and receiving signals
from leaving the bag.
 Act as major sale tool
 learn user preferences by placing options
like "more ads like this" and "less ads like
this" in each advertisement.
 Because of its low cost and power
consumption this technology has a great
future ahead.
 www.google.com
 www.wikipedia.com
 www.studymafia.org
Thanks
Bluejacking ppt.pptx

Bluejacking ppt.pptx

  • 1.
    www.studymafia.org Submitted To: SubmittedBy: www.studymafia.org www.studymafia.org Seminar On Bluejacking
  • 2.
     Introduction  BluejackingTechnology  Architecture  Technical Features  How to Bluejack  Usage of bluejacking  Related concepts  Future aspects  Conclusion  Reference
  • 3.
    • Bluejacking – Sendingof unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers via the OBEX protocol. • Origin – Started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.
  • 4.
     Bluetooth technology vCard  OBEX protocol
  • 5.
    • Short rangewireless LAN • Connects numerous devices of different functions like telephones, notebooks, computers, digital cameras etc. , in Personal Area Network (PAN). • Three areas - Data and Voice access points, Cable replacement, and Ad hoc networking. • Supports point - to - point as well as multi-point. • Low power • Low cost single chip radio – feasible
  • 6.
    Piconet • The devicesfind each other and form a network called “ piconet ” spontaneously. • A piconet is a basic unit with up to 8 nodes, one of which is a master and up to seven active slave nodes within a maximum distance of 10 meters. • All communication between master and slaves. • Piconet is a centralized TDM system. • Master controls clock and decides the time slot for the device. • In a piconet , there can be up to 255 parked nodes. • Master switches to low power state and parked node wait for beacon from master.
  • 8.
    Connection Type Spread Spectrum(Frequency Hopping) & Time Division Duplex (1600 hops/sec) Spectrum 2.4 GHz ISM Open Band (79 MHz of spectrum = 79 channels) Modulation Gaussian Frequency Shift Keying Transmission Power 1 mw – 100 mw Data Rate 1 Mbps Range 30 ft Supported Stations 8 devices Data Security –Authentication Key 128 bit key Data Security –Encryption Key 8-128 bits (configurable) Module size 9 x 9 mm
  • 9.
     Classification ofdevices on the basis of Power dissipated & corresponding maximum Range. POWER RANGE CLASS I 20 dBm 100 m CLASS II 0-4 dBm 10 m CLASS III 0 dBm 1 m
  • 10.
    • Mobile • Personalcomputers • Software tools – Bluespam • Searches for all discoverable Bluetooth devices and sends a file to them (spam's them) if they support OBEX. • By default a small text will be send.
  • 11.
     Customize themessage that should be send you need a palm with an SD/MMC card, then you create the directory /PALM/programs/BlueSpam/ Send/ and put the file you would like to in into this directory. Activity is logged to /PALM/programs/BlueSpam/Log/log.txt. › Mobiluck
  • 12.
    › Meeting point Is compatible with pocket PC, palm, Windows. › Proximity mail › Easyjack › Freejack  Freejack is compatible to java phone like Nokia N- series.
  • 13.
     Busy shoppingcentre  Starbucks  Train Station  High Street  On a train/ tube/ bus  Cinema  Café/ restaurant/ pub  Mobile phone shop  Electronics shop (e.g. Dixons)
  • 14.
    0 5 1015 20 25 30 35 Public transportation Stores ans shopping malls Restaurants Bars Cafés Home Places where bluejack occures
  • 15.
     Advertisement  Marketingopportunity › Viral communication › Community activities › Location based service
  • 16.
     Do nothack any device  Don't send abusive messages  Don't threaten anyone  Don't put your personal information in a BlueJack message  Don't reveal yourself to the 'victim'  Do disable Bluetooth if you don't want to be BlueJacked
  • 17.
  • 18.
     Is theunauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs.  Even if your device is hidden bluesnarfing can also be done.
  • 19.
     Provision ofany small digital media to suitable media provisioning enabled devices over Bluetooth via the OBEX protocol.
  • 20.
     Form ofBluetooth attack.  Allows the user to take control of a victim's phone to call the user's phone.
  • 21.
     Earlier issue Promotes an environment that puts consumer devices at greater risk.  Complete memory contents of some mobile phones can be accessed by a previously trusted paired device.  Phonebook and calendar can be obtained without owners knowledge.
  • 22.
     Present Scenario primarily occurs in public spaces  Security issues previously involved with bluejacking has been resolved.  In order for information to be duplicated, the devices would have to be paired. Bluejacking does not require a password to be entered and therefore the two devices are not paired
  • 23.
     Turn offyour Bluetooth device until you need to communicate with another user.  Buy an E2X bag. › It blocks all transmissions and receiving signals from leaving the bag.
  • 24.
     Act asmajor sale tool  learn user preferences by placing options like "more ads like this" and "less ads like this" in each advertisement.
  • 25.
     Because ofits low cost and power consumption this technology has a great future ahead.
  • 26.
  • 27.