INTRODUCTION
Bluejacking is not mobile hacking or hijacking its totaly different. Bluejacking is a harmless prank played on people who have switched Bluetooth on their phones.
blue is taken from Bluetooth, the technology bluejacking uses.
jacking is derived from both "ajack" and "hijacking"
Even thought bluejacking does not resemble hijacking There is no accessing or taking private data from your victim's device.
Bluejacking is totally limited to Bluetooth enabled devices.Bluetooth has a very limited range, usually around 10 metres on mobile phones, but laptops and other instrument with high power transmitters can reach up to 100 meters.
Bluejacking Explained
“Bluejacking” is define as sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, Laptops, sending a contact which typically contains a message in the name field to another bluetooth enabled device via the OBEX protocol.
Few prople say the term “Bluejacking” originated with a user named ajack on esato.com. Some people say that the term bluejacking comes from Bluetooth and hijacking. While that certainly sounds logical, a bluejacker doesn't hijack anything, he just send a contact to the recipient's device. Both parties have absolute control over their devices, and a bluejacker will not be able to take control of your phone or steal your personal information.
You can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone. So, personalised messages like 'I like your pink top' and the startled expressions that result is where the fun really starts.
Bluejacking is quite harmless, but because bluejacked people don't know what is happening, they think their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well.
But with the increase in the availability of bluetooth enabled devices, these devices have become vulnarable to virus attacks and even complete take over of devices through a trojan horse program.
Bluejacking Process
* Go to Contacts.
* Create a new contact.
* Write the short message you want to send on the line next to 'Last name'
* Save this contact.
* Select this contact and send via Bluetooth.
* Your phone will search for devices
* All the Bluetooth devices near you will be displayed.
* Select any one you like and send.
* You have bluejacked someone.
You can also send pictures to your victim by adding them to your bluejack contact. The best thing about this is even if the victim rejects the contact that you sent him/her, the picture gets automatically saved in the victim's My Pictures section.
Note:
It is not that interesting after 2 or 3 trials. Its just a prank. Do NOT harass anyone with this. Be careful at some places and with some peoples, especially in airports where the tolerance level is very low. Also don't send threatening messages. Technically you cannot be traced, but if the victim notices you behaving in a suspicious way with your mobile phone in your hand, you better run for your life.
Blujacking
Sunday, February 7, 2010
Posted by sumit ranjan at 11:55 AM 0 comments
Subscribe to:
Posts (Atom)