Ios 8 Password Bypass

Ios 8 Password Bypass

Sergei Skorobogatov, a senior fellow at the security group at the University of Cambridge computer lab, said he managed to bypass the iPhone password using the NAND mirroring technique. It was this technique at the beginning of 2016 that the FBI experts called unsuitable for hacking the iPhone 5c of the terrorist Sayed Farouk, as a result of which the authorities spent more than a million dollars on attracting hackers who have a working way to bypass the password on a smartphone. However, as it turned out now, hacking the iPhone with a similar method is possible, and most importantly. the cost of the electronic components necessary for its use does not exceed 100.

Hackers were given a million dollars

The terrorist Sayed Farouk, who killed 14 people with his wife last December in San Bernardino, California, was shot dead by police some time after the crime was committed. The found smartphone of the murdered terrorist could turn out to be a serious clue and lead to the discovery of his accomplices, probably preparing other attacks, however, Faruk’s iPhone 5c was password protected.

For unlocking the smartphone (and at the same time creating a backdoor in the system), the FBI turned to Apple, which it refused, insisting on its strictest privacy policy. Continuing to put pressure on Apple, the FBI was looking for a way to independently hack the terrorist’s iPhone 5c, which she eventually found. An unnamed hacker group managed to bypass the password and provide authorities with access to information on a device where nothing useful was found. For services hackers have paid more than a million dollars.

You may also like

  • You can download the Windows 10 Activator of course at random, without thinking, maybe it will do, but it’s his choice that baffles many. The network now has a large selection of sites and other resou...
  • Hello. In 2016, the Chinese manufacturer of mobile gadgets Meizu made a responsible decision. to abandon all Google utilities in a standard set of applications. Thus, a lot of disk space and RAM were ...
  • How to connect iPhone to LG Smart TV? Such a topic is relevant, because more and more people are switching from Android to Apple. TV manufacturers take this into account, so connectivity is possible. ...
  • Typical malware representatives are viruses, trojans, keyloggers. Phones and tablets need ongoing protection from them. We have selected the best antiviruses. paid and free. for the Android OS, which ...
  • Knowing how to connect the phone to a computer, you can use this opportunity to transfer data directly from one device to another.And without the help of the Internet, and at a fairly high speed.This ...
  • Follow the instructions in this article to delete personal information from the device, even if it is not already with you.If you still have an iPhone, iPad, or iPod touchBefore you sell, transfer or ...

Video: Ios 8 Password Bypass

And could manage one hundred

As it turned out now, the cost of bypassing the password could be ten thousand times less. Sergey Skorobogatov published a report in which he described the use of the NAND mirroring method for hacking iPhone 5c running iOS 9.3. The specialist reinforced the document with a video clip in which he talks and shows directly the process of password bypass.

Having taken out the NAND flash memory from the iPhone, Skorobogatov copied it many times, which made it possible to use the brute force password without fear in locking the device, which, as you know, is carried out after ten times the password is entered incorrectly. The process of selecting a password from a specialist took about 20 hours, while he claims that a six-digit key can be cracked with brute force for up to three months. The cost of the components that Skorobogatov needed to crack was only £ 75 (100).

FBI will have to answer

Particularly intriguing in the whole story is the fact that the head of the FBI, James Komi, during a press conference announced the impossibility of hacking the iPhone 5c terrorist with NAND mirroring technology. After that, a similar statement was made several times, since experts in the field of computer security many times pointed out to the FBI representatives the possibility of using the method of copying NAND flash memory. Not a question, but a complaint, voiced by Skorobogatov himself, who said that taxpayer money was wasted. Will the FRB be asked for what reason the most labor-intensive method was not even given a chance?

Potential threat

In his report, Skorobogatov noted that his attack can be successfully carried out not only on the iPhone 5c, but also on the iPhone 5s and iPhone 6. Smartphones use the same type of NAND flash memory, so you don’t even need to slightly change the method of copying it. For other smartphone models, this attack cannot be used, but the expert is sure that in the end it will be possible to adapt the method for them as well.

What else are watching:

Put 5 stars at the bottom of the article if you like this topic. Follow us on Telegram, VKontakte, Instagram, Facebook, Twitter, Viber, Zen, YouTube