What do you think Locking your iPhone with a passcode is enough. Read this Blog and you will know all about this.

How HACKERS can easily Crack your iPhone Passcode…

For iPhone Passcode is the “FIRST LINE OF DEFENCE” against Hackers. Length of the Passcode is 4-6 digits. Which is very difficult to break. If you trying to attempt many wrong passcodes then the data will be wiped.

So now what happens. How can passcode be cracked? Lets Discuss.

  • A researcher, Matthew Hickey, has discovered an easy way to bypass passcode limit. According to him, instead of entering combinations of multiple four or six-digit codes, a single long string with various codes (without spaces) will bypass the limit. This can be done by connecting the device to a computer.
  • In this a virtual keyboard pretending to type lots of passcodes. He sends all possible four-digit PIN combinations as if they came from a USB keyboard, the cracking method bypasses Apple’s protection against incorrect passcode entry, ultimately unlocking the phone once the correct combination is entered.
  • Matthew Hickey said he found a way around that. He explained that when an iPhone or iPad is plugged into a computer then hacker sends keyboard inputs, it triggers an interrupt request, which takes priority over anything else on the device.
  • “Instead of sending passcode one at a time and waiting, send them all in one go”.
  • If you do brute-force attack in one long string of inputs, it’ll process all of them, and bypass it.

In this video, the researcher demonstrates on (Friday 22nd of June 2018) how to unlock iPhone by sending a continuous stream of keyboard input the equivalent of typing keys very very fast as all the possible combinations of passcodes don’t get blocked by Apple’s security. features LINK of the video.

Apple spokesperson Michele Wyman said on (Saturday 23rd of June 2018 ): “The recent report about a passcode bypass on iPhone was in error and a result of incorrect testing.

Apple did not say why it disputed Matthew Hickey’s findings, which he reported to the company Friday, before tweeting.

Matthew Hickey’s able to send all combinations of a user’s possible passcode in one go, by enumerating each code from 0000 to 9999, and concatenating the results in one string with no spaces. He explained that because this doesn’t give the software any breaks, the keyboard input routine takes priority over the devices.

But after some time Matthew Hickey tweeted later, saying that not all tested passcodes are sent to the device’s secure enclave, which protects the device from brute-force attacks.

He tweeted “The passcodes don’t always go to the secure enclave processor in some instances due to pocket dialing or overly fast inputs so although it ‘looks’ like pins are being tested they aren’t always sent and so they don’t count, the devices register fewer counts than visible.” 

Matthew Hickey credited Stefan Esser for his help.

  • He said”I went back to double check all code and testing,” “When I sent codes to the phone, it appears that 20 or more are entered but in reality its only ever sending four or five pins to be checked.”

Apple recently confirmed an upcoming version of its iOS operating system for iPhones and iPads would have a USB timeout feature enabled by default. After an hour had passed since a user had unlocked their phone (via passcode, Touch ID, or Face ID), the iPhone Lightning port used for USB connections would no longer accept data. This would lock out current cracking tools.

The company also said it has made changes in the low-level software used to allow interaction with peripherals via USB, like keyboards, to fix security exploits and weaknesses it had found.

Matthew Hickey’s demonstration only in a recent release of iOS, version 11.3, while the current version is 11.4, and version 12 will be out later this fall.

Apple is rolling out a new feature, called USB Restricted Mode, in its upcoming iOS 12 update, which is said to make it far more difficult for Hackers to get access to a person’s device and their data.

If you want to be secured from these types of vulnerabilities and know more about these types of attacks Contact KSS.

If You Want to Know Can you afford a security breach Read THIS!

Please follow and like us:

Leave a Reply

Your email address will not be published. Required fields are marked *