Bluejacking is a hacking method that allows an individual to send anonymous messages to Bluetooth-enabled devices within a certain radius.

a. First of all hackers scan the surroundings for searching other devices with the help of Bluetooth enabled device.

b. Then hacker sends an unsolicited message to the detected devices.

c. Bluejacking is also known as bluehacking.

Explanation :

a. Bluejacking exploits a basic Bluetooth feature that allows devices to send messages to contacts within range.

b. It does not involve device hijacking, as the name implies.

c. The bluejacker may send only unsolicited messages.

d. Actually hijacking never occurs because the attacker never has control of the victim’s device.

e. Bluesnarfing and bluebugging, however, are actual attacks that may result in a user losing control of his device.

BlueSnarfing :


Bluesnarfing is the term associated with downloading any and all information from a hacked device. Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to Bluejacking



Bluebugging is a form of Bluetooth attack. In progression of discovery date, Bluetooth attack started with bluejacking, then bluesnarfing, and then bluebugging. Bluebug program allows the user to take control of a victims phone to call the users phone. This means that the Bluebug user can simply listen to any conversation his victim is having in real life.

f. Although bluejacking, bluesnarfing and bluebugging use Bluetooth as the point of entry, bluesnarfing and bluebugging are far more harmful.

g. Bluejacking can be prevented by setting a device to hidden, invisible or non-discoverable mode.

Various steps involved in Bluejacking :

  1. Go to contacts in your Address Book program (e.g. Outlook)
  2. Create a new contact
  3. Enter the message into one of the name fields
  4. Save the new contact
  5. Go to the address book
  6. Right-click on the message/contact
  7. Go to action
  8. Go to Send to Bluetooth
  9. Click on other
  10. Select a device from the list and double click on it

Software Tools :

a. Bluespam:


BlueSpam searches for all discoverable Bluetooth devices and sends a file to them (spams them) if they support OBEX

b. Meeting point:

i) Meeting point is the perfect tools to search for Bluetooth devices.

ii) Combine it with any bluejacking tools and have lots of fun.

iii) This software is compatible with pocket PC, Windows.

c. Freejack :

Freejack is compatible to java phone like Nokia N-series.

d. Easyjacking (eJack):

Allows sending of text Messages to other Bluetooth enables devices.

Application of Bluejacking :

a. Bluejacking can be used in many fields and for various purposes like in the busy shopping center,train station, high street, cinema, cafe/restaurant/Pub street,cinema,cafe/restaurant/pub,etc.

b. The main use of bluejacking tools or bluejacking is in advertising purpose and location based purpose.

c. Experimental results show that the system provides a viable solution for realizing permission-based mobile advertising.

Code of Ethics :

Code of Ethics

a. Bluejackers will only send messages/pictures. They will never try to hack a device for the purpose of copying or modifying any files on any device or upload any executable files.

b. Any such messages or pictures sent will not be of an insulting, libelous or vulgure in nature and will be copyright free or copyrighted by the sender.

c. If no interest is shown by the recipient after 2 messages the bluejacker will desist and move on.

d. The bluejacker will restrict their activity to 10 messages maximum unless in exceptional circumstances.

e. If the Bluejacker senses that he/she is causing distress rather than mirth to the recipient they will immediately decease all activity towards them.

f. If a bluejacker is caught in the act he/she will be as co-operative as possible and not hide any details of their activity.

How to Prevent Being Bluejacked :

a. To prevent being Bluejacked, disable Bluetooth on the mobile device when not in use.

b. The device will not show up on a “Bluejacker’s” phone when he/she attempts to send a message and they do not queue up.

Conclusion :

Bluejacking is a technique by which we can interact with new people and has ability to revolution rise market by sending advertisement about the product,enterprise etc. on the Bluetooth configured mobile phone so that the people get aware about them by seeing them on the phone.

One clap, two clap, three clap, forty?

By clapping more or less, you can signal to us which stories really stand out.