Bluejacking sending messages over Bluetooth to Bluetooth-enabled devices
“Bluejacking” is define as sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, Laptops, sending a contact which typically contains a message in the name field to another bluetooth enabled device via the OBEX protocol.
Few prople say the term “Bluejacking” originated with a user named ajack on esato.com. Some people say that the term bluejacking comes from Bluetooth and hijacking. While that certainly sounds logical, a bluejacker doesn't hijack anything, he just send a contact to the recipient's device. Both parties have absolute control over their devices, and a bluejacker will not be able to take control of your phone or steal your personal information.
You can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone. So, personalised messages like 'I like your pink top' and the startled expressions that result is where the fun really starts.
Bluejacking is quite harmless, but because bluejacked people don't know what is happening, they think their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well.
But with the increase in the availability of bluetooth enabled devices, these devices have become vulnarable to virus attacks and even complete take over of devices through a trojan horse program.
Bluejacking Process
Few prople say the term “Bluejacking” originated with a user named ajack on esato.com. Some people say that the term bluejacking comes from Bluetooth and hijacking. While that certainly sounds logical, a bluejacker doesn't hijack anything, he just send a contact to the recipient's device. Both parties have absolute control over their devices, and a bluejacker will not be able to take control of your phone or steal your personal information.
You can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone. So, personalised messages like 'I like your pink top' and the startled expressions that result is where the fun really starts.
Bluejacking is quite harmless, but because bluejacked people don't know what is happening, they think their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well.
But with the increase in the availability of bluetooth enabled devices, these devices have become vulnarable to virus attacks and even complete take over of devices through a trojan horse program.
Bluejacking Process
- Go to Contacts.
- Create a new contact.
- Write the short message you want to send on the line next to 'Last name'
- Save this contact.
- Select this contact and send via Bluetooth.
- Your phone will search for devices
- All the Bluetooth devices near you will be displayed.
- Select any one you like and send.
- You have bluejacked someone.
Note:
It is not that interesting after 2 or 3 trials. Its just a prank. Do NOT harass anyone with this. Be careful at some places and with some peoples, especially in airports where the tolerance level is very low. Also don't send threatening messages. Technically you cannot be traced, but if the victim notices you behaving in a suspicious way with your mobile phone in your hand, you better run for your life.
It is not that interesting after 2 or 3 trials. Its just a prank. Do NOT harass anyone with this. Be careful at some places and with some peoples, especially in airports where the tolerance level is very low. Also don't send threatening messages. Technically you cannot be traced, but if the victim notices you behaving in a suspicious way with your mobile phone in your hand, you better run for your life.
No comments:
Post a Comment