iphone5 passcode by...
 
Notifications
Clear all

iphone5 passcode bypass

14 Posts
11 Users
0 Likes
1,065 Views
(@horking)
Posts: 10
Active Member
Topic starter
 

😯
Our customer tell me there is a tools can get SMS bypass the passcode of iphone4S/5.but I had tried of UFED\XRY\MPE+\Oxygen\Mobiledit!All they can't do this.
Is there anyone knows what's tools\software can do this?

 
Posted : 28/01/2013 12:45 pm
(@randomaccess)
Posts: 385
Reputable Member
 

Nope
Heard a rumour that elcomsofts ios toolkit can do it. but it says to "jailbreak" your 4s, which i was under the impression wasnt possible.

otherwise if anyone knows how to reverse engineer the escrow keybags please let me know

 
Posted : 28/01/2013 4:21 pm
Robbo747
(@robbo747)
Posts: 37
Eminent Member
 

😯
Our customer tell me there is a tools can get SMS bypass the passcode of iphone4S/5.but I had tried of UFED\XRY\MPE+\Oxygen\Mobiledit!All they can't do this.
Is there anyone knows what's tools\software can do this?

There isn't & good luck in attempting to retrieve such messages on a fully-fledged encrypted iPhone 4s/5. What tools are these your customer mentions?

The only way to unlock a handset lock on a iphone 4s or 5 is to submit it over to Apple. Join the cue- according to IACIS members, American law enforcement are experiencing backlogs with Apple.

Not physically on the exhibit itself, but in law enforcement, the 'tools' in which SMS messages are obtained is by way of inquiring with the telecommunications provider to provide stored communications. Different telcos keep their customers SMS messages for different periods of time. As for other bits of data sent over the network, eg-Viber messages, these play out as GPRS data packets. Hence why the Australian Government is currently seeking to introduce mandatory data retention & probably following suit to what the US has already got in place.

 
Posted : 22/02/2013 8:33 pm
(@sgreene2991)
Posts: 77
Trusted Member
 

Nope
Heard a rumour that elcomsofts ios toolkit can do it. but it says to "jailbreak" your 4s, which i was under the impression wasnt possible.

otherwise if anyone knows how to reverse engineer the escrow keybags please let me know

I have heard that too, but I've never tried it. Elcomsofts other products do work very well, might be worth a little extra money to get it just in case.

 
Posted : 22/02/2013 9:21 pm
(@c-r-s)
Posts: 170
Estimable Member
 

I don't have the latest iPhones at my fingertips, but isn't the emergency call trick (will be patched in 6.1.3) enough to access sms?

 
Posted : 22/02/2013 10:10 pm
(@randomaccess)
Posts: 385
Reputable Member
 

I don't have the latest iPhones at my fingertips, but isn't the emergency call trick (will be patched in 6.1.3) enough to access sms?

if it's anything like the previous bug of the same nature then no.
if i recall all i could get in ios 4.1 was pictures, contact information and call logs. anything you can get to in the phone app

 
Posted : 23/02/2013 3:52 am
(@jonathan)
Posts: 878
Prominent Member
 

The only way to unlock a handset lock on a iphone 4s or 5 is to submit it over to Apple. Join the cue- according to IACIS members, American law enforcement are experiencing backlogs with Apple.

So there is some sort of back door?

 
Posted : 23/02/2013 2:38 pm
(@trewmte)
Posts: 1877
Noble Member
 

The only way to unlock a handset lock on a iphone 4s or 5 is to submit it over to Apple. Join the cue- according to IACIS members, American law enforcement are experiencing backlogs with Apple.

So there is some sort of back door?

But just NOT available to 'all and sundry'.

Generally, this question has been raised/asked for many, many years.

Having worked in mobile 'phone development (in my past), devices that have security settings have what are known as 'exits' or 'escapes'. In mobile development they do not think in terms of "forensics" or "evidence". Development projects, e.g. meaning development handsets, are the focus. Checking security means you cannot lock, permanently, every 'test handset' under development, so 'exits' are built in, which saves on 'prototypes' being produced, and means diagnostics etc can be performed. Colloquially speaking 'exits' are 'backdoors'. So are there backdoors in handsets? Of course there are and well-known manufacturers have a different approach not only for testing but for other requirements, too.

Enquiries to open password protected handsets in legal terms are based upon law, lawful requests, legitimacy, proportionality and other reasonableness tests.

 
Posted : 23/02/2013 10:14 pm
(@pxtxr)
Posts: 7
Active Member
 

So there is some sort of back door?

I'll try to explain this without going into too much technical depth.

As far as we know there are no back doors inserted by Apple. One of the main hurdles for companies trying to acquire data from Apple devices is getting their code running on the platform. This is hard because Apple only allows code that has been verified and approved (signed) by them to run. Code signatures are trivial for Apple to bypass as they can approve whatever code they want. Once you have your code running on the platform you can basically read whatever data you want. So you're free to read the memory chips and pass that data back over USB. This is as I said trivial for Apple as they have the secret keys required to get their code running and they're familiar with the platform so creating code to read the memory chips and send it out over USB is also trivial. So this Apple can help you with.

Now the next problem is that the user data file system contained on these chips is encrypted with a key stored in the effaceable area. Once the data has been decrypted you have the file system in plain text. This Apple can help you with.

Trying to examine the files you run into another issue, some of the files are encrypted. These files are in different protection classes with differently calculated keys. Some of those keys are calculated from multiple factors, for example a combination of device specific keys and the user passcode. Once you've figured out the passcode you can decrypt all files. This Apple really can't help you with if the passcode can't be trivially guessed.

Another issue is restoring deleted information from the file system. Deletion of a file is as simple as marking the file deleted in the file system and throwing away the decryption key. Deleting the entire file system is as simple as throwing away the decryption key to it.

The steps Apple can help you with is getting the data out of the device, decrypt the file system and try to guess the passcode in order to decrypt some of the files.

This is about as secure, in my opinion, as you can reasonably expect from a platform which is always on, always ready.

Correct me if I made a mistake somewhere as I'm writing all of this from memory.

 
Posted : 25/02/2013 12:42 pm
(@trewmte)
Posts: 1877
Noble Member
 

Correct me if I made a mistake somewhere as I'm writing all of this from memory.

Peter which area did you work at Apple regarding iPhone?

 
Posted : 26/02/2013 11:17 am
Page 1 / 2
Share: