BlueJacking

BlueJacking

BlueJacking

Let me convey something before we start this simple prank called as BlueJacking…
Bluejacking is quite harmless, but because bluejacked people don’t know what is happening, they think their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it’s possible to send images or sounds as well.
It is not that interesting after 2 or 3 trials. Its just a prank. Do NOT harass anyone with this. Be careful at some places and with some peoples, especially in airports where the tolerance level is very low. Also don’t send threatening messages. Technically you cannot be traced, but if the victim notices you behaving in a suspicious way with your mobile phone in your hand, you better run for your life. But using this play we can fool those people who maintains their mobile numbers as highly confidential….

What is BlueJacking???

By this time I ill tell you what is Bluejacking…
Bluejacking is not mobile hacking or hijacking its totally different. Bluejacking is a harmless prank played on people who have switched Bluetooth on their phones.
blue is taken from Bluetooth, the technology bluejacking uses.
jacking is derived from both “ajack” and “hijacking”.

Even though bluejacking does not resemble hijacking There is no accessing or taking private data from your victim’s device.

Limitations…

Bluejacking is totally limited to Bluetooth enabled devices.Bluetooth has a very limited range, usually around 10 meters on mobile phones, but laptops and other instrument with high power transmitters can reach up to 100 meters.
“Bluejacking” is define as sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, Laptops, sending a contact which typically contains a message in the name field to another bluetooth enabled device via the OBEX protocol.

Few people say the term “Bluejacking” originated with a user named ajack on esato.com. Some people say that the term bluejacking comes from Bluetooth and hijacking. While that certainly sounds logical, a bluejacker doesn’t hijack anything, he just send a contact to the recipient’s device. Both parties have absolute control over their devices, and a bluejacker will not be able to take control of your phone or steal your personal information.

Where the Fun really Starts..?

You can create a phone book contact and write a message, eg. ‘Hello, you’ve been bluejacked’, in the ‘Name’ field. Then you can search for other phones with Bluetooth and send that phone book contact to them. On their phone, a message will pop up saying “‘Hello, you’ve been bluejacked’ has just been received by Bluetooth” or something along those lines. For most ‘victims’ they will have no idea as to how the message appeared on their phone. So, personalized messages like ‘I like your pink top’ and the startled expressions that result is where the fun really starts.

How to BlueJack a mobile??

Until now i hope that u have guessed the procedure.. but let me explain it in steps if you are confused a little bit.

Bluejacking Process

* Go to Contacts.

* Create a new contact.

* Write the short message you want to send on the line next to ‘Last name’

* Save this contact.

* Select this contact and send via Bluetooth.

* Your phone will search for devices

* All the Bluetooth devices near you will be displayed.

* Select any one you like and send.

* You have bluejacked someone.
And thats it.. You can also send pictures to your victim by adding them to your bluejack contact. The best thing about this is even if the victim rejects the contact that you sent him/her, the picture gets automatically saved in the victim’s My Pictures section.
Just simply try tis with ur frnds n enjoy…. And this is for educational purpose only..dont abuse.

Learn more about how to Trace mobile number in India.
Rajesh

I'm Rajesh from CSE background and I'm specialized in Blogging, SEO, Website Designing.I'm an entrepreneur and I make my living online.You can find me here

5 thoughts on “BlueJacking

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.