Saturday, 26 November 2016

Bypass iPhone Passcode to Access Photos and Messages


Bypass iPhone Passcode to Access Photos and Messages

 

Setting a passcode on your iPhone is the first line of defense to help prevent other people from accessing your personal details.

However, it's pretty much easy for anyone with access to your iPhone to bypass the passcode protection (doesn't matter if you configured Touch ID or not) and access your personal photos and messages.
A new critical security flaw discovered in iOS 8 and newer, including 10.2 beta 3, allows anyone to bypass iPhone's passcode and gain access to personal information using the benevolent nature of Apple's personal assistant Siri.
The security glitch has been discovered by EverythingApplePro and iDeviceHelps and now that they have gone public with a video demonstration, you can expect Apple to fix this issue in the next iOS beta version.
All an attacker need is to find out the phone number of the target's iPhone and access to the phone for a few minutes.
But, what if you don't have target's phone number? No worries. You can hold down the home button of target's iPhone to activate Siri and simply ask "Who am I?" Siri will reply you with the phone number it is using.

 

Image description not specified.

Here's How to bypass iPhone's Lockscreen:



Once you got the phone number, follow these simple steps to reading personal messages and accessing personal photos on target's iPhone:

Step 1: Since now you have target's phone number, call on his/her iPhone – starting a FaceTime call will also do it.

Step 2: Now, targets iPhone screen will show a message icon, just click on 'Message icon' and then 'Custom Message' to go to the New Message screen where you are allowed to type a reply.


Step 3: Next, you need to activate Siri by long-pressing the Home button and say "Turn on Voice Over," and Siri will get the job done by turning it ON.

Step 4: Go back to the message screen and double tap the bar where you are required to enter the caller's name and then hold, while immediately click on the keyboard. This may not succeed in the first time, so repeat this step until you see a slide-in effect on the iPhone's screen above the keyboard.

Step 5: Now, ask Siri to "Turn off VoiceOver," come back to messages and simply type in the first letter of a caller's name in the top bar, tap ⓘ icon next to it, and then create a new contact.

Step 6: Next, you can select add photo and choose a photo. Yes, now you are in and can look at the victim's photo gallery just like you are browsing the phone, even though the iPhone is still in the locked state.

Step 7: You can select any contact on the iPhone, and you would be able to see all previous conversations of the target with that contact.

 

Wifi Hacking @ a new level

Wifi Hacking @ a new level

 

Hackers can steal your sensitive information, such as your Passwords, PINs and Keystrokes, from your phone by observing changes in the wireless signal as you enter them into your smartphones.
A group of researchers from the Shanghai Jaio Tong University, the University of South Florida and the University of Massachusetts at Boston have demonstrated a new technique that can reveal private information by analyzing the radio signal Interference, using just one rogue WiFi hotspot.
Dubbed WindTalker, the attack sniffs a user's fingers movement on the phone's touchscreen or a computer's keyboard by reading the radio signal patterns called Channel State Information (CSI).

Here’s How An Attacker Track your fingers moves on a smartphone screen:

Image description not specified. 

When you enter your PIN number or password in any app or swipe your smartphone lock screen pattern, your finger movements alter the WiFi signals transmitted by a mobile phone, and the movements are imprinted into the signal.

Now, hackers with control to a public Wi-Fi hotspot to which your device is connected to could then intercept, analyze, and reverse engineer those signals to accurately guess what sensitive data you have typed into your phone or in password input fields.
The WindTalker attack is particularly effective as it does not require any access to the victim's phone and works with regular mobile phones.

The attack needs the hacker to control a rogue WiFi access point to which the target will connect to and collect WiFi signal disturbances.
WindTalker will also not work with older internet router that has one antenna to broadcast Wi-Fi signals around your home, as it relies on a technology called Multiple Input, Multiple Output (MIMO).



Image description not specified. 

However, this is not a problem because the latest wireless routers now come with multiple antennas and MIMO technology, which enables routers to connect and transmit data from multiple devices simultaneously.


WindTalker Attack has an Over 68% Accuracy