-->
This doesn't involve any hijacking as in the name. Bluejacker can only send unsought messages. Hijacking doesn't actually occur here because the attacker will not govern the victim's device. At worst, Bluejacking is a vexation.
1). Select an area with plenty of mobile users.
2). Go to contacts in your address book. Create a new contact.
3). Enter the message you want to send in the name part. Save the new contact.
4). Choose send via bluetooth.
5). Then it searches for any Bluetooth enabled device with in the range.
6). Choose one phone and send the contact.
7). You will get message like in below picture showing message is sent.
Bluejacking can be prevented by setting a device in hidden, invisible or non-discoverable mode. However through this Bluejacking we don't have any harm to data in our phone. But there are certain techniques which will look quite similar to Bluejacking and can gain control over the data in our phones. Bluesnarfing and Bluebugging however are the actual attacks that may result in user loosing control on his device. These techniques will be explained in coming posts.
You May Also Like
1. Fuel cell - A Revolution in Technology
-->
What is Bluejacking?
Bluejacking, a hacking method by which an individual can send bulk messages to Bluetooth enabled devices with in certain radius(normally the range of Bluetooth is 10metres for mobile phones but for laptops it is 100metres with intense transmission) without pairing.This doesn't involve any hijacking as in the name. Bluejacker can only send unsought messages. Hijacking doesn't actually occur here because the attacker will not govern the victim's device. At worst, Bluejacking is a vexation.
How Bluejacking can be done?
This is very simple and is explained below:1). Select an area with plenty of mobile users.
2). Go to contacts in your address book. Create a new contact.
3). Enter the message you want to send in the name part. Save the new contact.
4). Choose send via bluetooth.
5). Then it searches for any Bluetooth enabled device with in the range.
6). Choose one phone and send the contact.
7). You will get message like in below picture showing message is sent.
Bluejacking can be prevented by setting a device in hidden, invisible or non-discoverable mode. However through this Bluejacking we don't have any harm to data in our phone. But there are certain techniques which will look quite similar to Bluejacking and can gain control over the data in our phones. Bluesnarfing and Bluebugging however are the actual attacks that may result in user loosing control on his device. These techniques will be explained in coming posts.
You May Also Like
1. Fuel cell - A Revolution in Technology
No comments:
Post a Comment
Criticism Accepted :)