11 Jun 2011

BLUEJACKING?

Bluejacking is not mobile hacking or
hijacking its totaly different.
Bluejacking is a harmless prank
played on people who have
switched Bluetooth on their phones.
blue is taken from Bluetooth, the
technology bluejacking uses.
jacking is derived from both
"ajack" and "hijacking"
Even thought bluejacking does not
resemble hijacking There is no
accessing or taking private data
from your victim's device.
Bluejacking is totally limited to
Bluetooth enabled devices.Bluetooth
has a very limited range, usually
around 10 metres on mobile
phones, but laptops and other
instrument with high power
transmitters can reach up to 100
meters.
Bluejacking Explained
“Bluejacking” is define as sending of
unsolicited messages over Bluetooth
to Bluetooth-enabled devices such
as mobile phones, PDAs, Laptops,
sending a contact which typically
contains a message in the name
field to another bluetooth enabled
device via the OBEX protocol.
Few prople say the term
“Bluejacking” originated with a user
named ajack on esato.com. Some
people say that the term bluejacking
comes from Bluetooth and
hijacking. While that certainly
sounds logical, a bluejacker doesn't
hijack anything, he just send a
contact to the recipient's device.
Both parties have absolute control
over their devices, and a bluejacker
will not be able to take control of
your phone or steal your personal
information.
You can create a phonebook contact
and write a message, eg. 'Hello,
you've been bluejacked', in the
'Name' field. Then you can search
for other phones with Bluetooth and
send that phonebook contact to
them. On their phone, a message
will popup saying "'Hello, you've
been bluejacked' has just been
received by Bluetooth" or
something along those lines. For
most 'victims' they will have no idea
as to how the message appeared on
their phone. So, personalised
messages like 'I like your pink top'
and the startled expressions that
result is where the fun really starts.
Bluejacking is quite harmless, but
because bluejacked people don't
know what is happening, they think
their phone is malfunctioning.
Usually, a bluejacker will only send a
text message, but with modern
phones it's possible to send images
or sounds as well.
But with the increase in the
availability of bluetooth enabled
devices, these devices have become
vulnarable to virus attacks and even
complete take over of devices
through a trojan horse program.
Bluejacking Process
Go to Contacts.
Create a new contact.
Write the short message you want
to send on the line next to 'Last
name'
Save this contact.
Select this contact and send via
Bluetooth.
Your phone will search for devices
All the Bluetooth devices near you
will be displayed.
Select any one you like and send.
You have bluejacked someone.
You can also send pictures to your
victim by adding them to your
bluejack contact. The best thing
about this is even if the victim
rejects the contact that you sent
him/her, the picture gets
automatically saved in the victim's
My Pictures section.
Note:
It is not that interesting after 2 or 3
trials. Its just a prank. Do NOT
harass anyone with this. Be careful
at some places and with some
peoples, especially in airports where
the tolerance level is very low. Also
don't send threatening messages.
Technically you cannot be traced,
but if the victim notices you
behaving in a suspicious way with
your mobile phone in your hand,
you better run for your life.

No comments:

Post a Comment