ADS

SUBSCRIBE

To Get Latest Updates On WhatsApp,
JOIN our WhatsApp Broadcast List.
Send Us Your Name on our WhatsApp No.
8109566059
Don't Forget To SAve Our No. in your Contact List.

How To Bypass IPhone Passcode Lock Screens

Easy way to bypass Passcode lock screens on                    iPhones, iPads running iOS 11


The vulnerability allowing anyone to bypass the passcode lock screen still exists in iOS 11.0.2




Other privacy holes :
Anyone can use Siri to read your new/unread text messages, send text messages and see your most recent phone call.
To do that, again prompt Siri to wake up using a finger not associated with the phone's authentication. Then say, “Read messages,” and Siri will read any unread text messages from the lock screen. Say, "Send a text message [person's name]," and Siri will let you dictate a message and send it. Say, "Show me recent calls," and Siri will display your most recent phone call.

THERE ARE 4 WAYS TO BYPASS IPHONE/IPAD PASSCORE OR FINGERPRINT

With iOS 11, you can still bypass the iPhone lock screen and trick Siri into getting into a person's phone. The bypass is the same as it was in the earlier version of the operating system:
  • Press the home button using a finger not associated with your fingerprint authentication, prompting Siri to wake up.
  • Say to Siri: Cellular data.
Siri then opens the cellular data settings where you can turn ON/off cellular data.

THEN


FIRST WAY :

Pushing the Home button to activate Siri and asking her to open a non-existing app. Siri responds that you have no such app, but she “can help you look for it on the App Store Tapping on the App Store button opens a “a new restricted browser window.” Either select update and open the last app, or “push twice on the Home button” for the task slide preview to appear. Swipe over to the active front screen task and that bypassed the passcode lock screen on iPhone models 5, 5s, 6 and 6s.


SECOND WAY :

first pushing on the Home button for two seconds to activate Siri and then asking to open the clock app. Switch to world clock in the bottom module and tap the image for the Weather Channel LLC network; if the weather app is deactivated by default, then a new restricted browser window will open which has App Store menu links. Click update and open the last app, or tap twice on the Home button to get to task slide preview. Swipe over to the active front screen and voila – passcode lock screen bypassed again; this reportedly works on iPhone models 5, 5s, 6 and 6s.


THIRD WAY :

The third attack scenario works on iPad model 1 and 2, but basically follows the same steps as scenario two to bypass the passcode and gain unauthorized access to the device.


FOURTH WAY:

The fourth way to bypass the lock screen passcode involves forcing Siri to open by pushing the Home button and asking her to “open Events/Calendar app.” An attacker could tap the “Information of Weather Channel” link which is found at the bottom of the screen next to the “Tomorrow module.” If the weather app is deactivated by default, then a new restricted browser window opens with App Store links. Tap update and open the last app, or push twice on the Home button to bring up the task slide preview. Swipe over to select the active front screen and the passcode on the lock screen is bypassed.




Although the Apple security team was reportedly notified on January 4, there are no dates listed in the vulnerability disclosure timeline for Apple responding or developing a patch. Vulnerability Lab proposed the following temporary solution for users to harden device settings:

  1. Deactivate in the Settings menu the Siri module permanently.
  2. Deactivate also the Events Calendar without passcode to disable the push function of the Weather Channel LLC link.
  3. Deactivate in the next step the public control panel with the timer and world clock to disarm exploitation.
  4. Activate the weather app settings to prevent the redirect when the module is disabled by default in the events calendar.


NEXT ARTICLE Next Post
PREVIOUS ARTICLE Previous Post
NEXT ARTICLE Next Post
PREVIOUS ARTICLE Previous Post
 

Delivered by FeedBurner