Bluejacking ppt

19
Presentation on

description

PPT on blue jacking ... everything you need

Transcript of Bluejacking ppt

Presentation on

Contents

• Bluetooth

• Introduction-Bluejacking

• Features

• How it is done

• Usage of bluejacking

• Advantages & disadvantages

• Software tools

• Prevention

• Misconceptions

• Future aspects

• Conclusion

BluetoothBluetooth is a wireless technology that provides short range communications that is proposed to replace the cables connecting portable & fixed devices along with maintaining high levels of security.

Main features of Bluetooth

• Robustness• Low power• Low cost

Advantages

• Duplex mode• Handles data & voice• It is free• Easy to transfer data• Independent of network &

phone number.

Disadvantages

• Doorway to various techniques like bluejacking, bluesnarfing etc.

Bluejacking• Bluejacking makes use of Bluetooth technology to send

unsoliciated messages to bluethooth enabled devices.

• Receiver does not get to know who has send the to it

• Receives the message along with the name and model of the senders phone.

• This is known as bluejacking.

Features• Does not involve removal or alteration of any data from the

device.

• Sends only a text message but it has now became possible to send images & sounds

• Bluejacking exploits a Bluetooth devices ability to discover other nearby Bluetooth devices.

How it is doneUsing mobiles

The various steps involved in this are as follows:

1. Choose "New contact" 2. Then in the first line choose your desired message. 3. Then press done.4. Then go to the contact. 5. Then press options.6. Then scroll down to send. 7. Then choose "Via Bluetooth" 8. Then the phone will be searching for enabled Devices. 9. Then press "Select"

Using PCs/laptops:

1.Go to contacts in your Address Book program.2.Create a new contact3.Enter the message into one of the 'name' fields4.Save the new contact5.Go to the address book 6.Right-click on the message/contact7.Go to action8.Go to Send to Bluetooth9.Click on other 10.Select a device from the list and double click on it.

Usage of Bluejacking

• It can be used in malls for advertisement purposes

• Used at railway stations to give information about general rules, train timings etc.

• Used at cafe, restaurants and various stores to provide various information regarding them.

Software tools• By downloading few software tools on PC or Bluetooth configured

devices, you can directly search for the Bluetooth enabled devices and send unsolicited messages to them.

• Few software tools are:

i. Bluespamii. Meeting point iii. Freejackiv. Easy-jackingv. Proximity mail

Prevention• There is no software available to prevent bluejacking, but some

solutions that help in getting rid of it are :

i. Phone owners who receive a bluejack message should refuse to add the contacts to their address book.

ii. Devices could be set in non-discoverable or invisible modes.

iii. Turn off your Bluetooth device at certain public areas.

Misconceptions

• Bluejacking doesn’t give the sender any personal data.

• Both sender and receiver can have complete control on to the devices.

• It is actually harmless.

• No malfunctioning can take place.

Future aspects• Extensively used for getting necessary information.

• People may stop using Bluetooth and only bluejackers will be playing with eachother.

• Develop software for location tracking.

• Device cannot be hacked.

Conclusion• In future this technology becomes the key for advertising

and to interact with world.

• It can also be used to get the location messages on the phone when you are some where out.

• Bluejacks are location specific. • The data indicate that bluejacking is an activity

that primarily occurs in public spaces, outside of the home.

Any Queries ?

Presentation by

Bhavvishyya

Charwitha

Sravani