This is the sending of messages, address book contacts and pictures through Bluetooth to a device which is Bluetooth enabled like laptops computers, mobile phones and public digital assistant. Bluetooth can only work within a radius of ten meters from the devices.
Steps of blue jacking attacks
Identify an area to conduct blue jacking, it should be an area where many mobile users are, a place with so many people is mostly recommended like supermarkets, restaurants, airport, shopping mall, cell or mobile phone stores and train station (Sheltz 102). Prepare contacts to send, and then fill the first line and identifying the victim you would want to send a message is advantageous because you can even send a photo to his or her device. After feeding the message to send, scan for Bluetooth device which is switched on by pressing send using Bluetooth. Phone model will be displayed or phone which has a named Bluetooth, immediately you receive models or names in screen select one phone and send the contact. When message has been delivered a confirmation “message send” and victim short message tone listed in your phone then you have successfully blue jacked. In case you identify person you have blue jacked you can send a message which will amuse him or her (Sheltz 160). In some places to send a message via blue jacking is not allowed.
In order to prevent blue jacking one should turn off Bluetooth in public vicinity. Public areas include supermarkets, phone and electronic stores, bars and clubs and shopping mall. Secondly you can set your Bluetooth device to hidden, undetectable mode from the menu. This helps in preventing sender from identifying your gadget (Stewart 184). Lastly when send a message through Bluetooth you ignore by pressing the rejecting button in your phone or any other gadget.
Ethernet authentic protection (EAP) is used in the creation of fault tolerance by constructing a primary and secondary path for virtual local area network. Transport layer security (TLS). This is used in internet to perform certain activities which include providing communication security, hide the sections of network connections above transport layer. Transport layer security use asymmetric hide for exchange of keys, symmetric conceal for privacy and reliable codes for message truthfulness (Sheltz 221). There are several types and version of protocols which are used in applications like internet faxing, instant message and web browsing.
Challenge-Handshake authentic protocol provides protection against changing users which try to attack or use information without the consent of the owner. CHAP only deals with client and server because they know their own secretes; although this cannot be send over the network. CHAP is a unique scheme used by direct servers to confirm the individuality of distant clients. CHAP proves the identity of clients by using a three-way handshake (Stewart 225). Clients who use CHAP verify themselves based on a shared secret such as passwords.
Message digest (MD-5) is a compact digital signature for randomly long stream of binary data. Perfect message digest does not produce same signature for different sets of input, and to achieve this perfection message digest should be as long as the input file. MD5 is widely used in security applications and commonly used to check data reliability. Security of MD5 is not very hash as compared with the other EPAs (Stewart p, 301). Collision attack is used to find collisions within seconds in a computer. Chosen-prefix collision attack produces collision between two chosen inputs within hours.
Password authentication protocol (PAP) is used to confirm users before they access server resources. This is a protocol where a password is used as the basis of identification, without a password u will not be able to access the source (Sheltz 202). Protected extensible authentication protocol (PEAP) is used to correct inadequacy in EAP. PEAP need only a server side to secure TLS tunnel to secure user authentication.