Breaking News

Lexar Launches the NM990 PCIe 5.0 SSD DJI Agras T100, T70P and T25P Launches Globally Sony Introduces the RX1R III Razer Introduces Next-Generation Connectivity and Performance with New Thunderbolt 5 Dock and Core X V2 Transcend's New ESD420 Portable SSD Offers MagSafe Compatibility and Pro-Level Performance

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Researchers Bypass iPhone Password in Just A Few Minutes

Researchers Bypass iPhone Password in Just A Few Minutes

Smartphones Feb 11,2011 0

German researchers were able to break the password Apple's iPhone 4 in just six minutes, highlighting the public perception of protection strength provided by Apple's iOS device encryption does not reflect all aspects of the security for stored passwords. In a new report, Jens Heider and Matthias Boll of the Fraunhofer Institute for Secure Information Technology show how to make speedy work of hacking the smartphone.

The reserahcers conducted tests with iPhone 4 and iPadWiFi+3G hardware with the latest firmware 4.2.1.

They firstly got access to the file system, copied the keychain access script to file system and then they executed a script which revealed stored accounts and secrets.

The first step depends on the device?s iOS version and hardware but in general can be achieved with a jailbreaking tool and by installing an SSH server on the device without overwriting user data. Now software can be launched unrestricted on the device.This way the software can access all files including the keychain database. Secrets in this database are encrypted with the device's key, which could not be extracted from the device. However, the key can be used from software within the device.

In the second step, the researchers copied their keychain access script to the device via the SSH connection. It uses system functions to access the keychain entries, which made it not necessary to reverse engineer the encryption mechanism of the keychain items.

The last step executes the script, which outputs the found accounts to the shell screen.

After using a jailbreaking tool, to get access to a command shell, the researchers run a small script to access and decrypt the passwords found in the keychain. The decryption was done with the help of functions provided by the operating system itself.

"The overall approach takes six minutes, which might provide an additional opportunity for an attacker to return the device to the owner to cover the revealing of passwords," the researchers said.

The results show that a lost iOS device may endanger also the confidentiality of data that is not stored on the device, but which is accessible for an attacker via the revealed stored secrets. This is not specifically a problem only to iOS devices, as other smartphone operating systems may also have circumventable password protection mechanisms. However, iOS devices with device encryption may keep users in false believe that these devices have in general a strong password protection in place.

Regrading the iOS compliance to individual enterprise security policies, especially the sometimes applied comparison to fully encrypted notebook harddisks with preboot authenticaion is not valid, since these systems use the user?s secret for the device encryption.

"Owner's of a lost or stolen iOS device should therefore instantly initiate a change of all stored passwords. Additionally, this should be also done for accounts not stored on the device but which might have equal or similar passwords, as an attacker might try out revealed passwords against the full list of known accounts," the researchers suggested.

Tags: iPhone
Previous Post
Smaller iPhone in The Works: report
Next Post
EA's Need for Speed Undercover and the Tetris Game Coming to the BlackBerry PlayBook

Related Posts

  • The Leica LUX Grip For The iPhone

  • Apple debuts iPhone 16 Pro and iPhone 16 Pro Max

  • Apple announced tons of new products: Watch Series 7, new iPad, iPad mini, iPhone 13 / 13 mini and iPhone 13 Pro / Pro Max!

  • Apple introduces iPhone 12 Pro and iPhone 12 Pro Max with 5G

  • Apple announces iPhone 12 and iPhone 12 mini

  • Apple Denies FBI Claims About Shooter's iPhone

  • Q1 Smartphone Shipments in China Were Down 18% Year on Year

  • Smartphone Production Expected to Drop by 16.5% YoY in 2Q20

Latest News

Lexar Launches the NM990 PCIe 5.0 SSD
PC components

Lexar Launches the NM990 PCIe 5.0 SSD

DJI Agras T100, T70P and T25P Launches Globally
Drones

DJI Agras T100, T70P and T25P Launches Globally

Sony Introduces the RX1R III
Cameras

Sony Introduces the RX1R III

Razer Introduces Next-Generation Connectivity and Performance with New Thunderbolt 5 Dock and Core X V2
Gaming

Razer Introduces Next-Generation Connectivity and Performance with New Thunderbolt 5 Dock and Core X V2

Transcend's New ESD420 Portable SSD Offers MagSafe Compatibility and Pro-Level Performance
PC components

Transcend's New ESD420 Portable SSD Offers MagSafe Compatibility and Pro-Level Performance

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Noctua NH-D15 G2

Noctua NH-D15 G2

Soundpeats Pop Clip

Soundpeats Pop Clip

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Pure Base 501

be quiet! Pure Base 501

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed