BlueJacking is one of the mostly harmless activity can happen with any multimedia cell phone. Though it is an unintended and illegal use of a technical feature, mostly hard-core geeks do not find sufficient technical challenge in the activity. For the more serious hacker and crackers looking to explore the security features of their Handset. BlueTooth hacking tools (BlueJacking Tools) should be used in a legal and in ethical way. Remember one thing real people own these devices, and rely on them for everyday tasks, so please remember to “Do Not Harm”.
Now, What Is Exactly Bluejacking ??
BlueTooth Hijacking or BlueJacking is a technique which used to sending unsolicited messages over Bluetooth to Bluetooth enabled devices such as mobile phones, PDAs or laptops, computers, sending a vCard which typically contains a message in the name field to another Bluetooth enabled device via the OBEX protocol.
As I already said, Bluejacking is usually harmless, however because BlueJacked people generally don’t know what has happened, they may think that their phone is malfunctioning. A BlueJacker will only send a text message, but in these days with modern phones it is possible to send sounds, clips and images as well. Bluejacking has been used in marketing campaigns to promote advergames and products.
In nowadays, With the increase in the availability of Bluetooth enabled devices (Phone, PDA etc etc), it is often reported that these devices have become vulnerable to virus, Trojan, malware attacks and even complete take over of devices through a trojan horse program although most of these reports are easily debunked. Bluejacking is also confused with Bluesnarfing which is the way in which mobile phones are illegally hacked via Bluetooth.
Tools For Bluejacking
There are many tools that have been developed for BlueJacking, most of the development happened in the 2008 to 2012, where multiple new bluetooth vulnerabilities were discovered. There are not any specific or official tool but are there many tools to assist someone in bluejacking, only a few hidden tools are available for the more sinister “BlueSnarfing” or “BlueBugging”. Most commonly used bluetooth software are “Bloover” and “Easyjack”
BlueJacking is very useful for hackers on that device which do not require authentication and in these days almost (99%) handsets are required authentication before making any connection to another Bluetooth enable handset.
Countermeasures
Well after all if you how we can attack with BlueJack, we should also know how we can prevent from BlueJack and what are the countermeasures against BlueJacking. So I am going to give some Countermeasures:-
1. To Prevent BlueJacking, make sure that your device’s bluetooth is turn off in certain public areas like shopping centers, movie theaters, coffee houses, bars, university and electronic stores.
2. Set your Bluetooth device to invisible or hidden mode from the main menu. This will prevents the sender from seeing your device.
3. Turning your Bluetooth invisible remains a good option when you normally don’t connect with other devices. Enable visibility only when you need to pair your device with another.
4. Ignore BlueJacking messages by refusing or deleting them. Consider BlueJacking the same way you think about spam.
5. Attackers or Hacker begin BlueJacking by placing a message in the name field of their phone like, “Special Offer” or “wow!! you won this prize, enter 123 to unlock” Next, they look for enabled devices in the area and select the one they want to BlueJack. They usually send these messages via Bluetooth.
0 comments:
Post a Comment
WELLCOME MY WEB