logo
 
  1. IT-Security >
  2. Hacking >
  3. How to hack iPhone's Lock Screen on iOS 12 to Access Contacts and Photos?


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

How to hack iPhone's Lock Screen on iOS 12 to Access Contacts and Photos?

Hacking vom | Direktlink: githacktools.blogspot.com Nachrichten Bewertung


Apple may pride itself on its commitment to user privacy and security, but it isn't invulnerable. EverythingApplePro now know there is a bug in the latest version of iOS 12 and iOS 12.1 beta that allows those in the know to bypass iPhone passcode and access contacts and photos. This applies to both Face ID and Touch ID-enabled iPhones. Not only Gadget Hack know about the bug itself, they know exactly how to exploit it.

On Sept. 26, the YouTube account Videosdebarraquito posted two videos (in Spanish) showing off how to bypass any iPhone locked by a passcode running iOS 12. This YouTuber is also the one responsible for discovering previous lock | screen exploits. Soon after the new videos, tech channel EverythingApplePro made his own video (in English), based on the information exposed by Videosdebarraquito.


You can watch how to bypass iPhone Lock Screen right now below, but it's a complicated procedure. To make it easier to understand, EverythingApplePro have listed the steps necessary to exploit the security vulnerability underneath the video, so jump down to see them and follow along with the video:

 
So, how to bypass iPhone's Lock Screen on iOS 12 to access Contacts and Photos?
1, If Face ID is disabled, you're ready. If it is enabled, cover the Face ID camera with tape. If it's a Touch ID device, you're already ready to go.
2, Long-press the Side button to activate Siri. If it's a Touch ID device, just long-press the Home button.
3, Tell Siri to "enabled VoiceOver."
4, Click the Side button to sleep the device.
5, Use another iPhone and phone call or FaceTime call the target iPhone.
6, Single-tap the "Message" icon on the incoming call screen, then double-tap anywhere on the screen.
7, Single-tap "Custom" on the list that appears, then double-tap anywhere on the screen.
8, Single-tap the plus (+) icon in the top right to highlight it.
9, On the other iPhone, send a text or iMessage to the target iPhone.
10, Right when the notification appears on the target iPhone, double-tap anywhere on the screen to select the highlighted plus (+) icon underneath it.
11, Wait until the screen goes white and the notification disappears.
12, Single-tap on the screen to highlight an invisible option.
13, Swipe left on the screen multiple times until you hear VoiceOver say "Cancel." An invisible button will be highlighted underneath the notch, barely noticeable. It's more obvious on a Touch ID device.
14, Double-tap anywhere on the screen to select the "Cancel" option.
15, Single-tap the numbers icon in the keyboard, then double-tap anywhere on the screen.
16, Single-tap any number in the top row of the keyboard, then double-tap anywhere on the screen. You should now see all of the contacts that begin with that number. You can 3D Touch on them to see more of their contact details.

   Continue on to View Photos in the Photos Library:
17, If you see an info (i) button next to any of the contacts, single-tap on it, then double-tap anywhere on the screen. (We could not find any of our contacts with an (i) next to them, but you may have better luck.)
18, Long-press the Side button to activate Siri. If it's a Touch ID device, just long-press the Home button.
19, Tell Siri to "disable VoiceOver."
20, Swipe up from the bottom of the screen to exit the Siri screen back to the contact page. If it's a Touch ID device, simply click the Home button once.
21, 3D Touch on the contact's icon up top on their info page. A menu will appear with options such as "Call," "Message," and "Add to Existing Contact."
22, Single-tap "Add to Existing Contact." You should now be able to see all of the contacts on the iPhone in order, unlike before when you could only see contacts based on the number you input.
23, Single-tap any contact.
24, Single-tap on the contact's photo icon where it says "add photo," then single-tap "Choose Photo" from the popup. You won't actually be able to see any photos at this point.
25, Long-press the Side button to activate Siri. If it's a Touch ID device, just long-press the Home button.
26, Tell Siri to "enabled VoiceOver."
27, Swipe up from the bottom of the screen slowly until you feel a vibration, to exit the Siri screen back to the photos page (which looks like the contact page). If it's a Touch ID device, simply click the Home button once.
28, Swipe right multiple times on the screen until you hear "Camera Roll."
29, Double-tap anywhere on the screen to select the "Camera Roll" option.
30, Single-tap on the screen where an image would normally appear.
31, Double-tap anywhere on the screen to select the photo highlighted.
32, Swipe left or right multiple times on the screen until you highlight the "Choose Photo" option.
33, Long-press the Side button to activate Siri. If it's a Touch ID device, just long-press the Home button.
34, Tell Siri to "disable VoiceOver."
35, Swipe up from the bottom of the screen to exit the Siri screen back to the contact page. If it's a Touch ID device, simply click the Home button once.
36, Single-tap "edit" on the contact's photo, then choose "Edit Photo" from the menu.
37, You can now view the photo in high resolution, albeit, with a translucent black around the main circle of the image selector.

As noted above in the instructions, to see the full contact list in order, as well as photos on the device, you'll need to see the "i" button appear next to a contact in Step 16. If "i" isn't present, you will only have access to the contact lists with that particular number in them.

As with most security-related bugs, we expect Apple to issue a software update as soon as possible. Make sure to check "Software Update" in the "General" settings often if you want to protect your iPhone from this bug. If you have iOS 12's new "Automatic Updates" enabled, you'll be all set.


And have something to say about GitHackTools or "How to bypass iPhone's Lock Screen on iOS 12 to Access Contacts and Photo"? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.


...

Externe Webseite mit kompletten Inhalt öffnen

Kommentiere zu How to hack iPhone's Lock Screen on iOS 12 to Access Contacts and Photos?






➤ Ähnliche Beiträge

  • 1.

    Deobfuscating/REversing Remcos - AutoIt, Shellcode, and RunPE

    vom 542.41 Punkte ic_school_black_18dp
    Remcos is a robust RAT actively being used in the wild. This multi-staged/evasive RAT provides powerful functionality to an attacker. Each stage is written in a different language: AutoIt -> Shellcode -> C++. I wanted to explore both the evasiven
  • 2.

    How to hack iPhone's Lock Screen on iOS 12 to Access Contacts and Photos?

    vom 373.25 Punkte ic_school_black_18dp
    Apple may pride itself on its commitment to user privacy and security, but it isn't invulnerable. EverythingApplePro now know there is a bug in the latest version of iOS 12 and iOS 12.1 beta that allows those in the know to bypass iPhone passcode and access cont
  • 3.

    iPhone 11 Pro and iPhone 11 Pro Max: the most powerful and advanced smartphones

    vom 337.94 Punkte ic_school_black_18dp
    iPhone 11 Pro and iPhone 11 Pro Max: the most powerful and advanced smartphones<br/>Featuring a Stunning Pro Display, A13 Bionic, Cutting-Edge Pro Camera System and Longest Battery Life Ever in iPhone with iPhone 11 Pro Max<br/>Cupertino,
  • 4.

    Apple introduces dual camera iPhone 11

    vom 267.77 Punkte ic_school_black_18dp
    Apple introduces dual camera iPhone 11<br/>Featuring the Fastest, Most Powerful Chip Ever in a Smartphone, Plus an All-New Dual-Camera System and Even Longer All-Day Battery Life<br/>Cupertino, California — Apple today announced <a href="https://www.apple.com/iphone-11/"
  • 5.

    P4wnP1 A.L.O.A. - Framework Which Turns A Rapsberry Pi Zero W Into A Flexible, Low-Cost Platform For Pentesting, Red Teaming And Physical Engagements

    vom 182.86 Punkte ic_school_black_18dp
    P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Appliance".0. How to installThe latest image could be fo
  • 6.

    Ghidra Python Scripting - AZORult

    vom 174.11 Punkte ic_school_black_18dp
    When analyzing an AZORult sample, one particular hurdle for static analysis (at the code level) was the technique by the malware to call certain WinAPI functions.  The malware calls GetProcAddress repeatedly to locate the addresses of dozens of W
  • 7.

    CentOS Blog: CentOS Pulse Newsletter, September 2018 (#1804)

    vom 171.35 Punkte ic_school_black_18dp
    Dear CentOS enthusiast, Here's what's been happening in the past month at CentOS Releases and Updates The following releases and updates happened in August. For each update, the given URL provides the upstream notes about the change. Releases We're pl
  • 8.

    Scrounger - Mobile Application Testing Toolkit

    vom 154.59 Punkte ic_school_black_18dp
    Scrounger - a person who borrows from or lives off others. There is no better description for this tool for two main reasons, the first is because this tool takes inspiration from many other tools that have already been published, the second reason is because it lives off mobile application's vulnerabilities. Why Even t
  • 9.

    PMapper - A Tool For Quickly Evaluating IAM Permissions In AWS

    vom 148.63 Punkte ic_school_black_18dp
    A project to speed up the process of reviewing an AWS account's IAM configuration. Purpose The goal of the AWS IAM auth system is to apply and enforce access controls on actions and resources in AWS. This tool helps identify if the policies in place will ac
  • 10.

    iPhone Contacts App Vulnerable To SQLite Hack

    vom 145.64 Punkte ic_school_black_18dp
    If you are using an iPhone and thinking that it is the most secured device, then you are Wrong! The Check point security researcher... The post iPhone Contacts App Vulnerable To SQLite Hack appeared first on HackersOnlineClub.
  • 11.

    Re-imagining collaboration for Visual Studio with Live Share app casting and contacts

    vom 136.67 Punkte ic_school_black_18dp
    The power of Visual Studio for desktop and mobile development is unmatched in the industry, and we wanted to ensure that the best in class also had the best collaboration story. Live Share is reimagining this collaboration story by reducing the barriers to
  • 12.

    Apple previews iOS 13

    vom 133.35 Punkte ic_school_black_18dp
    Apple previews iOS 13<br/>Introduces Dark Mode, Advanced Photo and Camera Features, Sign In with Apple and an All-New Maps Experience<br/>San Jose, California — Apple today previewed iOS 13, introducing a dramatic new look for iPhone with