Prepared by:-Nirmal Dhruvi

Slides:



Advertisements
Similar presentations
M-Learning Simon Fitzpatrick. …use of mobile and handheld IT devices, such as PDAs, mobile phones, laptops and tablet PCs, in teaching and learning. BECTA.
Advertisements

Smart Mobs Key: AWL to Study, Low-frequency Vocabulary What is a Smart Mob?
1 Survey Technology. Data Collection Tools Available in the Market 1. Paper Survey 2. Smart Paper 3. Cell Phones 4. Personal Digital Assistants - PDAs.
Lesson 01: The Digital Experience  Transition from traditional devices to multipurpose digital devices. Wired phones move to cell phones and now smart.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
BuZZone for Trade Shows: Searching for New Partners and Efficiently Exchanging Information The product is developed by Bacup IT.
Standard Grade Computing Electronic Communication.
Computing Fundamentals Module A © CCI Learning Solutions Inc. 1 Unit 1: Recognizing Computers Lesson Topic 1Computers All Around Us 2Elements of a Personal.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
By Laura Trawin.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Adding attachments on an Attachments are files e.g. Videos, Photos, Word, PowerPoint, and work these are sent with an . Attachments are very.
Digital Technology Basics Digital Technology Basics includes two lessons:  Lesson 1: The Modern Digital Experience  Lesson 2: Digital Technology & Career.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
CONCRETE SOFTWARE SOLUTIONS PVT. LTD. A leading Digital Marketing Firm In India.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Sixth Sense Technology. Already existing five senses Five basic senses – seeing, feeling, smelling, tasting and hearing.
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
Starter for 10 Unit 10: Flickr & YouTube Transform IT SFT10_Flickr_YouTube.
Methods of communication
1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2010 Introductory Pasewark & Pasewark.
Cyber Crimes.
Terms - Mobile Marketing
Outlook Lesson 5 Managing Contacts Microsoft Office 2010 Advanced Cable / Morrison 1.
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
IST 210 Is “Secure Database” an Oxymoron. IST New technology We all demand more from our technology Devices’ functions start to converge PDA/Phone/Pager.
Unit 1 – Improving Productivity Josh Sherriff Instructions ~ 100 words per box.
1 of6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
Bluetooth Presented by Venkateshwar R Gotur CMPT
Telecommunication technology Then and Now. But First… What is telecommunication Technology? Telecommunication is the transmission of messages over a country.
Do pictures always give truthful information? Can publishing it be hurtful??
Pamela Wetzel ITC Summer 2. Types of Technology How to be Safe Online Research Tools Review Game Standards Credits.
FIRST SCREEN In 1929, we were introduced to the “First Screen” Still today, Television advertising is a tremendously effective way to market.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
ONE® Pages Training Presentation North York General Hospital.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
What is Data Communication? Data communication is the process of collecting and distributing data(text, voice, graphics, video, etc) electrically from.
MXit is a mobile application that allows people to chat to their friends at a much cheaper rate than normal text messages. You can contact anyone anywhere.
3.3 Mobile Digital Communication. Overview Demonstrate and apply the knowledge and understanding of the increasing use of mobile communication devices.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
6 January 2016Examples of communication systems1 Communication Systems 2/5 Examples.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cybersecurity Test Review Introduction to Digital Technology.
Communicating and Sharing with our 21 st Century Students.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
BLUETOOTH HACKING - Image the world without wireless By Indra Divya.K Kalasalingam University CSE-Final yr.
Mobile Device Security Management Leyna Belinsky.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Welcome to the Microsoft Outlook 2010 for Windows Tech Talk
& Google Gmail.
Introduction to Wireless Technology
Tech 190A Week 5 Lecture Soft Skills Series V.
Information Technology Services Education and Awareness Team
Progress leisure OCR GCSE ICT.
Year 10.
.
Information Technology Services Education and Awareness Team
3.3 Mobile Digital Communication
THE FUTURE OF MARKETING – Advertise and Collect Data!
Presentation transcript:

Prepared by:-Nirmal Dhruvi

Topics to study.. What is BlueJacking..? Range.. Origins.. Usage.. How to BlueJack..? Things you’ll need.. On Cell Phones..

Topics to study.. On Personal Computer/Laptop.. Warnings.. Software Tools.. Tips.. Bluesnarfing.. Bluebugging.. Prevention.. Conclusion..

What is BlueJacking..? BlueJacking is the sending of unsoliciated/undesired messages over bluetooth to bluetooth enabled devices such as as mobile phones, PDAs or laptop computers, sending a vcard which typically contains a message in the name field(i.e.for bluedating or bluechat) to another bluetooth enabled device via the OBEX (object exchange)protocol.

Range.. Bluetooth has a very limited range usually around 10 meters(32.8 ft) on mobile phones. but laptops can reach up to 100 meters (328 feet) with powerful (class 1) transmitters.

Origins.. Bluejacking was reportedly first carried out by a Malaysian IT consultant named “Ajack”posted a comment on a mobile phone forum Ajack told IT web that he used his Erricson cellphone in a bank to send a message to someone with a Nokia 7650.Becoming bored while standing in a bank queue.

Usage.. BlueJacking is usually harmless but because BlueJacked people generally don’t know what has happened they may think that their phone is malfunctioning. usually a BlueJacker will only send a text message but with modern phones its possible to send images or sounds as well BlueJacking has been used in guerrilla marketing campaigns to promote advergames.

How to BlueJack..? Bluejacking is a fun way to send messages to other people using bluetooth. So good for a small but funny prank. On cellphone.. On personal computer/laptop..

Things you’ll need.. A bluetooth enabled cell phone. A sense of humour. Most important a place with a lot of people having their bluetooth device swithced on. e.g. restaurants, train, café..

On Cell Phones.. Select an area with plenty of mobile users bluetooth enabled. Go to contacts in your address book. Create new contact. Enter the message into the same part. Save the new contact. Choose “send via bluetooth” these searches for any bluetooth device within range.

On Cell Phones.. Choose one phone and send the contact. You will get the message ”card sent” and then listen for the sms message tone of your victim’s phone. Look out for the shock look in your victim.And enjoy.. 

On Personal Computer/Laptop.. Go to contacts in your Address book program(e.g. Outlook). Create a new contact. Enter the message into one of the ‘name’ fields. Save the new contact. Go to the address book.

On Personal Computer/Laptop.. Right click on the message/contact. Go to action. Go to send to bluetooth Click on other. Select a device from the list and double cllick on it.

Warnings.. Do not spam or send offensive messages. Bluejacking won’t work on iPhones or iPads. Bluejacking definitely does not work on blueberry. Don’t use it for abusing a victim.

Software Tools.. Bluespam Freejack E-jack We can also do bluejacking using software such as.. Bluespam Freejack E-jack

Bluesnarfing.. Bluesnarfing is the unauthorised access of information from wireless device through a bluetooth connection, often between phones, desktops,laptops and PDAs(personal digital assistant) this allows access to a calender contact list emails and text messages and on some phones users can copy pictures and private videos both bluesnarfing and bluejacking exploits others bluetooth connecctions without their knowledge while bluejacking is essentially harmless as it only transmits data to the target device bluesnarfing is the theft of information from the target machine.

Bluebugging.. Bluebugging is a form of bluetooth attack often caused by a lack of awareness. It was developed after the onset of bluejacking and bluesnarfing. Similar to bluesnarfing, bluebugging accesses and uses all phone features but is limited by the transmitting power of class 2 bluetooth radios,normally capping its range at 10-15 meters.

Tips.. Bluejacking is not bluesnarfing or bluebugging which is not ethical. The bluejacking steps entered above works only for certain phones. There are many softwares that can help make a bluejacking easier.

Prevention.. There is hardly any software available to prevent or detect bluejacking. Turn off bluetooth. Don’t put device in discoverable and connectable mode.

Conclusion.. Low cost and power consumption technology. It may have great future if it should follow codes ethics.

Any Queries..??

THANK YOU.. 