Seminar Report
Seminar Report
Seminar Report
Vandita
Department of Computer Science & Engineering
Shri Balwant Institute of Technology
Sonepat,Haryana,India
Cse15324.sbit@gmail.com
V. BLUEJACKING TOOLS
Bluetooth wireless technology has suffered some bad press
and in particular has been associated with a new buzz word
‘Bluejacking’ which has emerged as a potential security issue
due to its facilitation of unauthorized access to confidential
information. The very phenomenon of Bluejacking has
evidently exhibited that Bluetooth is amply vulnerable to
attacks. Furthermore, the availability and continuous
development of bluejacking tool intensifies the Bluetooth
security paradigm. Some of the prime bluejacking tools are:
1) RedFang: A small proof-of-concept application
used to find undiscoverable Bluetooth devices.
2) Bluesniff: A proof-of-concept tool for a Bluetooth
wardriving.
VII. Advantages
IX. CONCLUSION
Bluetooth is a great technology with many useful applications.
At the same time, variety of Bluetooth hacking tools and
techniques are available, Bluejacking being the most vulnerable
of the lot, which makes it a little riskier to use this technology.
Bluetooth is not going to go away because of a few security
flaws; instead it can be secure if configured properly and used
carefully with a proper understanding of this wonderful
technology.
Best practices to mitigate the Bluejacking threats against the
Bluetooth are: user awareness, disable device when not in use,
use an unidentifiable device name, employ security mode 3 or
4, disable unused services and profiles, set device to non-
discoverable mode when not in use, use non-guessable PIN
codes of at least 12 or more alphanumeric characters and
perform pairing only when absolutely required.
Many users take privacy for granted. Unfortunately, the
Bluetooth system wasn’t intended for confidential purposes.
Although improvement in the domain of Bluetooth security.