Join Us!

iOS 7 passlock bypa...
 
Notifications
Clear all

iOS 7 passlock bypass  

  RSS
CopyRight
(@copyright)
Active Member

Hello,

So recently i received a case with an iOS 7 iPhone 4 that has a pass-lock, is there anyway i can bypass it to proceed with acquisition?

Thanks.

Quote
Posted : 11/11/2013 1:53 pm
DCS1094
(@dcs1094)
Active Member

I have not had an iPhone 4 with iOS 7 yet, however looks like Cellebrite PA supports iOS 7 'simple passcode' recovery for iPhone 4. From a quick look, XRY does not and not to sure about Oxygen..?

There is obviously alternative software out there… what do you have at your disposal?

ReplyQuote
Posted : 11/11/2013 2:39 pm
atifn79
(@atifn79)
New Member

hope it will help dude

http//www(DOT)youtube(DOT)com/watch?v=VBAaQBJYsC8

ReplyQuote
Posted : 14/12/2013 9:47 am
atifn79
(@atifn79)
New Member

A couple of weeks ago, the iPhone world discovered an exploit (not fixed) that allowed anyone to bypass the lockscreen and access the phone, messages, and even pictures.

Well, the bug has been caught in the GS3 world now, too. A few days ago, mobile enthusiast Terence Eden discovered a flaw that also allowed limited access to certain features of your Samsung Galaxy S3, and only in very certain circumstances. And it works no matter what protection you have enabled…Pattern Lock, PIN, Password, or Face Unlock.

Steps to Exploit #1
Lock your phone and turn the screen back on.
Go to Emergency Call.
Select the Emergency Contact icon on the bottom left.
When in the Emergency Contact screen, hit the Home button.
You will see a flash of your Home Screen (no matter what launcher you are using).
In that second when the Home Screen flashes, you can select an app/widget to execute.

The limitations with this exploit are that almost anything you select will run in the background, and you will be back at the lock screen. Where this exploit can be effective is if, let's say, you have a Direct Dial widget on your homescreen. In this case, someone can hit this widget, and the call will go through.

While this is something that should be fixed, it doesn't actually allow you to do much, so really, it's not all that scary. Unfortunately, the fun doesn't end there.

Yesterday, Sean McMillan of Full Disclosure opened up the initial exploit and discovered something much scarier. If successful, not only will this exploit open up the full contents and capabilities of your S3, but it will disable the lock screen completely until the phone is rebooted.

Steps to Exploit #2
Lock your phone and turn the screen back on.
Go to Emergency Call.
Select the Emergency Contact icon on the bottom left.
When in the Emergency Contact screen, hit the Home button.
Immediately after hitting Home, press the Power button.
If you did this correctly, the next time you press Power, your device will go directly to your homescreen.
This is obviously not good. Sean does note that you may need to do this multiple times to get it to work. Also, it doesn't matter what launcher you are using, or whether you are using a lockscreen replacement or not.

In the interest of full disclosure, I tried about 30 times, both with my rooted/modded phone, and with a bone-dry stock phone, and I couldn't replicate it.

But, just because I couldn't do it, doesn't mean it isn't real and dangerous. At this point, there has not been any word out of Samsung regarding this exploit, but I imagine a response and a patch will be on their way shortly.

This tip came from an iPhone repair center, where it’s common for people to bring in a phone for fixing and then forget to provide the pass-code.

this solution is brought to you by bathbooti a Mobiles & Tablets Repairing Company where people come with a problem and step out with a solution.
Atif Naser

ReplyQuote
Posted : 16/12/2013 9:14 am
CopyRight
(@copyright)
Active Member

@atifn79 Thanks for your contribution however the exploits you've discussed in your answer are outdates , cause the iOS has patched them from iOS 7.0.3 onwards.

However its always good to hear about these exploits hoping they still work.

ReplyQuote
Posted : 17/12/2013 9:25 am
Share: