I have an iPhone 4s with OS 5.1.1 I’m using IP-Box to get the passcode, the devise is disable tried several time but no hint it keep till the end of the process without hint.
I dont think that IP BOX is able to obtain the passcode of iOS 5.1
You can try this method as explain on the fonefunshop website
iPhone 4s iOs 6.1.3 - this works to an extent. this is how we got past a password
sim out, make emergency call, press home button, press contacts. this brings up a security input pad without a link to emergency call.
once done, connect clip and press button on clip, this will then begin the brute force.
we set a code of 0023, and after 23 tries it stopped vibrating but did not stop the counter on the tool.
we pressed cancel on the iphone and we were in the phone system now, but because the sensor on the device is a light sensor, and the phone screen did not change, the tool did not halt the count.
Bottom line is you can get access to the iPhone but cant learn the exact security code, i think someone may be able to modify the light sensor into some kind of vibration stop sensor perhaps?
iPhone 5 iOS 6.1.4
(Big thanks to one of our customers FoneJackerNI for this test report)
Same as the 4s 6.1.3 (above)
Need to keep an eye on the counter and ear open to the lock sound as the screen does not change once the successful code is found.
But it does work.
I had a ios 6.1 device recently which was unsuccessful.
That device is too old for IP Box to brute force. No USB OTG compatibility.
Just out of interest why do you have such an old iOS model?
Is this a retained device from quite a long time ago that you have kept under review for a way to break in?
That device is too old for IP Box to brute force. No USB OTG compatibility.
Actually, the device isn't too old, the IP-Box does support iPhone 4S. Did you mean the iOS version is too old to support USB OTG?
You can test the USB OTG functionality with IP-BOX by manually entering keys into the phone from the IP-BOX software, this has been done on an iPhone 4S running iOS 5.1.1 and works successfully, which does indicate to me (unless I'm confusing the issue) that USB OTG is supported and therefore IP-BOX is supported using this USB OTG exploit?
Yes my mistake, i meant iOS version.