SlideShare a Scribd company logo
2
Most read
6
Most read
11
Most read
<BLUE-T-ATTACK>
Presented By
SHRITAM KUMAR MUND
CSE
Hidden Dangers of using Bluetooth
3%
21%
64%
12%
Place Where Bluetooth attacks occur:
Home 3%
Cafes 21%
Stores and shopping malls 64%
Public transportation 12%
Bluetooth Attacks:
1. BLUEJACKING:
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices
such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a
message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device
via the OBEX protocol.
2. BLUESNARFING
Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
Bluetooth is a high-speed but very short-range wireless technology for exchanging data between
desktop and mobile computers, personal digital assistants (PDAs), and other devices.
3. BLUEBUGGING
Bluebugging is a form of Bluetooth attack often caused by a lack of awareness.
It was developed after the onset of bluejacking and bluesnarfing.
PREVENTION
• There is hardly any software available to prevent or detect blue-T-
attacks.
• Turn off Bluetooth.
• Update your device on regular basis.
• Change password when you come to know somting wrong happening
to your device.
CONCLUSION
• Low cost and power consumption technology.
• It may have great future if it should follow codes ethics.
Reference:
website search: www.wikipedia.org
Photos: Google images
Book: Faster_Ankit Fadia
You might can’t catch the pickpocket,
but you can stop the thief.
</THANK YOU>

More Related Content

PPTX
BLUEJACKING
DOCX
How to configure port security in cisco switch
PPT
Media Access and Internetworking
PPTX
Classes of adressing
PPT
Ipv4 vs Ipv6 comparison
PPT
About ip address
PPT
bluetooth-security
PPT
Introduction to Computer Networks
BLUEJACKING
How to configure port security in cisco switch
Media Access and Internetworking
Classes of adressing
Ipv4 vs Ipv6 comparison
About ip address
bluetooth-security
Introduction to Computer Networks

What's hot (20)

PPTX
COMPUTER NETWORKING
PDF
Internet+of+things+iot+learn+faster+the+io t+
PPTX
Network topologies
PPTX
Computer Network topology
PPTX
IOS command modes
PPTX
Packet Switching
DOCX
Protocols in Bluetooth
PPT
PDF
Network Security_Dr Shivashankar_Module 5.pdf
PPT
Data and signals.ppt
PPT
Computer network ppt
PPTX
Network topology
PPTX
Network topologies
PPTX
PPTX
3. Implementation of Pipelining in Datapath.pptx
PDF
Important questions on mobile computing
PPT
Advance ethernet
PPTX
Network topology
PPTX
Telnet & SSH
DOCX
Packet tracer practical guide
COMPUTER NETWORKING
Internet+of+things+iot+learn+faster+the+io t+
Network topologies
Computer Network topology
IOS command modes
Packet Switching
Protocols in Bluetooth
Network Security_Dr Shivashankar_Module 5.pdf
Data and signals.ppt
Computer network ppt
Network topology
Network topologies
3. Implementation of Pipelining in Datapath.pptx
Important questions on mobile computing
Advance ethernet
Network topology
Telnet & SSH
Packet tracer practical guide

Similar to Bluetooth Hacking (20)

PDF
Bluetooth Exploitation Attackssssssssssssssssssssss.pdf
PPTX
Bluejacking
PPTX
Blue jacking
PPTX
blue-JACKING.pptx
PPTX
Blue Jacking
PPTX
My seminar on bluejacking
PPTX
SEMINAR ON bluejackng
PPTX
Final bluejacking
DOCX
Bluetooth Attacks.docx
PPTX
Bluejacking sadhana
PPTX
Bluetooth network-security-seminar-report
PPTX
Bluejacking ppt.pptx
PPT
Bluejacking
PPTX
Bluejacking
PPT
Bluejacking by Niharika Mundra
PPTX
Bluejacking
PPT
Bluejacking
PPTX
Bluejacking ppt.pptx\Bluejacking is used for sending unauthorized messages to...
PPT
Bluejacking ppt
Bluetooth Exploitation Attackssssssssssssssssssssss.pdf
Bluejacking
Blue jacking
blue-JACKING.pptx
Blue Jacking
My seminar on bluejacking
SEMINAR ON bluejackng
Final bluejacking
Bluetooth Attacks.docx
Bluejacking sadhana
Bluetooth network-security-seminar-report
Bluejacking ppt.pptx
Bluejacking
Bluejacking
Bluejacking by Niharika Mundra
Bluejacking
Bluejacking
Bluejacking ppt.pptx\Bluejacking is used for sending unauthorized messages to...
Bluejacking ppt

Recently uploaded (20)

PDF
project resource management chapter-09.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Hybrid model detection and classification of lung cancer
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
August Patch Tuesday
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
project resource management chapter-09.pdf
Enhancing emotion recognition model for a student engagement use case through...
Hybrid model detection and classification of lung cancer
Zenith AI: Advanced Artificial Intelligence
cloud_computing_Infrastucture_as_cloud_p
August Patch Tuesday
1 - Historical Antecedents, Social Consideration.pdf
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation_ Review paper, used for researhc scholars
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A comparative study of natural language inference in Swahili using monolingua...
WOOl fibre morphology and structure.pdf for textiles
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Web App vs Mobile App What Should You Build First.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Bluetooth Hacking

  • 2. Hidden Dangers of using Bluetooth
  • 3. 3% 21% 64% 12% Place Where Bluetooth attacks occur: Home 3% Cafes 21% Stores and shopping malls 64% Public transportation 12%
  • 5. 1. BLUEJACKING: Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.
  • 6. 2. BLUESNARFING Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices.
  • 7. 3. BLUEBUGGING Bluebugging is a form of Bluetooth attack often caused by a lack of awareness. It was developed after the onset of bluejacking and bluesnarfing.
  • 8. PREVENTION • There is hardly any software available to prevent or detect blue-T- attacks. • Turn off Bluetooth. • Update your device on regular basis. • Change password when you come to know somting wrong happening to your device.
  • 9. CONCLUSION • Low cost and power consumption technology. • It may have great future if it should follow codes ethics. Reference: website search: www.wikipedia.org Photos: Google images Book: Faster_Ankit Fadia
  • 10. You might can’t catch the pickpocket, but you can stop the thief.