Professional Documents
Culture Documents
TECHNOLOGY
INTRODUCTION
Bluejacking is the sending of unsolicited
messages via vCard functionality over
Bluetooth to Bluetooth-enabled devices
using the OBEX (Object Exchange).
Bluejacking do not remove or alter any
data from the device.
The person who is being attacked does not
know ay information about the hacker
except the name assigned to the hackers
mobile phone.
Bluejacking technologies
Bluetooth technology
OBEX protocol
vCard functionality
Bluetooth Technology
Bluetooth is able to transmit voice,
data, video, and still image.
It can be used to wirelessly
synchronized and transfer data
among devices.
Low power
Low cost
Process Of Bluejacking
Bluejacking is quite concise, trouble-free and
effortless and it can be implemented by using
the following steps:
Go to contacts in the phonebook or address
book.
Choose the New Contact option.
Consecutively, create a new contact.
Enter the desired message into the name field
with which one wants to bluejack the other
device. Messages like you have been
bluejacked! startle the victim.
Usage of bluejacking
Shopping mall
Train station
Cinema hall
Caf/ pub
classroom
preventions
Turn off bluetooth device untill when
not in use.
Set the bluetooth device to hidden
mode.
conclusion
Bluejacking is a technique by which it
can interact with a new person and
can bring a great change in the world
of advertisement by sending about
the product, enterprises etc., on the
bluetooth.