Bluejacking

!!!! BLUEJACKING !!!!




In this world of booming technology where nearly every day a new word is generated it is not at all easy to know about things and u can be easily surprised. Bluejacking is one such term coming up rapidly which uses bluetooth as its medium. It can be done with the help of any bluetooth-enabled device such as mobile phones, PDAs or laptop computers sending a vCard that typically contains a message in the name field (i.e. for bluedating or bluechat) to another bluetooth enabled device via the OBEX protocol. It is the sending of unsolicited messages over Bluetooth.



These days generally loads of people have bluetooth enabled cell phones, which have a very limited range of around 10 meters, but when they are bluejacked they usually think that their cell phones are malfunctioning, as they don’t know about it. Bluejacking is usually technically harmless and a bluejacker will only send a text message, but with modern phones it’s possible to send images or sounds as well.



The origin of the name is disputed. It is widely believed that the term Bluejacking comes from Bluetooth and hijacking. However, a bluejacker doesn’t hijack anything: he or she merely uses a feature on the sender and the recipient’s device. And some believe that it was named after a user named Ajack, who designed an early utility for Bluejacking. Even if the name suggests but Bluejacking is not about stealing or even accessing information on somebody’s phone but rather is involved with sending fun anonymous messages. The act of stealing information is called bluesnarfing and is something else altogether.


The UK leads the world in Bluejacking as the majority of cellular phones sold in the US are not yet equipped with Bluetooth. As told before that Bluejacking involves sending anonymous text messages to other phone users via Bluetooth short-range radio it is also there that phones fitted with it can be made to search for other handsets using it that will accept messages sent to them. Mobile phone buffs have been Bluejacking for months but it now looks set to become much more widespread. Even the Web sites are offering tips on Bluejacking, and collections of startled reactions are popping up on the Internet.


Bluejacking is completely free and works regardless of which mobile provider you use, so if you use Orange, T-Mobile, O2, Vodaphone, Fresh or any other mobile phone company you can still BlueJack! In fact your phone doesn’t even need to be connected - ideal for those PAYG phones with no credit left.

 
:SugarwareZ-064: Time for the easy steps that show you how to bluejack.:SugarwareZ-064:


1. Select your area carefully, you need an area with plenty of mobile users, stations and areas with business men and women are best but supermarkets and other places with large groups of people are also good.


2. You’ll want to pre prepare a few contacts to send, fill in the first line and perhaps some of the other parameters like email, but most bluejack victims will only see the first line, it is possible to send photos too this can be great once you have identified a victim.


3. Scan for Bluetooth enabled phones, go into your phone’s contacts select the card you have already made and select “send via Bluetooth” this will start a search for all Bluetooth devices within a 10 meter range.

4. You will see a list of the phone names in range, pay attention as these will often be the phone model name useful for identifying who you have bluejacked or at least amusing to find who has a phone named “sexy bum”, quickly select one phone and send the contact, Bluetooth will take a while to deliver the contact so speed is important to get your victim before they move out of range.


5. Having sent the contact you should get the confirmation “card sent” and then listen for the SMS message tone of your victims phone. Success you’ve Bluejacked!


6. If you can identify who you managed to Bluejack then you can follow up with a specific message which will really freak out your victim, for example ” hey that’s a funky hat” or “what train are you catching” the best messages are often very humorous and should amuse your victim.


So that’s Bluejacking, there are a few limited software applications which can run on Sony Ericsson phones such as SMAN (see the software section for a review).


Bluesnarfing and Bluestumbling are both more intrusive uses of Bluetooth technology, Bluesnarfing is the process of connecting to a mobile device and copying the contents without authorisation, this vulnerability is limited to a handful of Sony Ericsson and Nokia Phones. Bluetumbling is similar but the vulnerability can only be exploited by a device that was previously paired but has since been removed from the mobile device list, so not really anything to lose sleep over.
 
Back
Top