Monday, April 21, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Sharp Improves LCD Viewing Angle With New Optical Film
Ex-Apple CEO To Sell Mobiles In India
HTC Hired Ex-Samsung Marketing Officer
Xbox One Wolrdwide Sales Cross 5 million
Samsung Works With GLOBALFOUNDRIES On 14 nm FinFET Offering
Facebook To Find Nearby Friends
Console Sales Lift AMD's First Quarter Results
LG Expands 'Second Screen' TV Ecosystem With Open-Source SDK
Active Discussions
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
Video editing software.
 Home > News > Mobiles > Researc...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, February 11, 2011
Researchers Bypass iPhone Password in Just A Few Minutes


German researchers were able to break the password Apple's iPhone 4 in just six minutes, highlighting the public perception of protection strength provided by Apple's iOS device encryption does not reflect all aspects of the security for stored passwords.

In a new report, Jens Heider and Matthias Boll of the Fraunhofer Institute for Secure Information Technology show how to make speedy work of hacking the smartphone.

The reserahcers conducted tests with iPhone 4 and iPadWiFi+3G hardware with the latest firmware 4.2.1.

They firstly got access to the file system, copied the keychain access script to file system and then they executed a script which revealed stored accounts and secrets.

The first step depends on the device?s iOS version and hardware but in general can be achieved with a jailbreaking tool and by installing an SSH server on the device without overwriting user data. Now software can be launched unrestricted on the device.This way the software can access all files including the keychain database. Secrets in this database are encrypted with the device's key, which could not be extracted from the device. However, the key can be used from software within the device.

In the second step, the researchers copied their keychain access script to the device via the SSH connection. It uses system functions to access the keychain entries, which made it not necessary to reverse engineer the encryption mechanism of the keychain items.

The last step executes the script, which outputs the found accounts to the shell screen.

After using a jailbreaking tool, to get access to a command shell, the researchers run a small script to access and decrypt the passwords found in the keychain. The decryption was done with the help of functions provided by the operating system itself.

"The overall approach takes six minutes, which might provide an additional opportunity for an attacker to return the device to the owner to cover the revealing of passwords," the researchers said.

The results show that a lost iOS device may endanger also the confidentiality of data that is not stored on the device, but which is accessible for an attacker via the revealed stored secrets. This is not specifically a problem only to iOS devices, as other smartphone operating systems may also have circumventable password protection mechanisms. However, iOS devices with device encryption may keep users in false believe that these devices have in general a strong password protection in place.

Regrading the iOS compliance to individual enterprise security policies, especially the sometimes applied comparison to fully encrypted notebook harddisks with preboot authenticaion is not valid, since these systems use the user?s secret for the device encryption.

"Owner's of a lost or stolen iOS device should therefore instantly initiate a change of all stored passwords. Additionally, this should be also done for accounts not stored on the device but which might have equal or similar passwords, as an attacker might try out revealed passwords against the full list of known accounts," the researchers suggested.


Previous
Next
Smaller iPhone in The Works: report        All News        EA's Need for Speed Undercover and the Tetris Game Coming to the BlackBerry PlayBook
Smaller iPhone in The Works: report     Mobiles News      Samsung Launches New Exynos Processor Family

Get RSS feed Easy Print E-Mail this Message

Related News
iPhone To Get China Push With China Mobile Deal
Get An Unlocked iPhone 5S From Apple Store
Curved iPhone With More Sensors?
Apple Admits iPhone 5s Battery Issue
Weak Orders For The iPhone 5C
iPhone 5s And iPhone 5c Arrive in Italy, Russia, Spain And More Than 25 Countries on Friday
Microsoft Buys Your Phone
Apple Continues Familiar Design and Pricing Strategy with iPhone 5c
iPhone 5s Carries $199 BOM and Manufacturing Cost
First Weekend iPhone Set New Record
Apple iPhone Fingerprint Scanner Hacked
Apple Confirms iOS7 Lockscreen Bug

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .