Wednesday, 23 November 2016

How To Bypass iPhone Passcode to Access Photos and Messages 2016

Posted by Sufyan Hacker  |  at  20:30:00

http://adf.ly/1fPW5C
 
Setting a passcode on your iPhone is the first line of defense to help prevent other people from accessing your personal details.

However, it's pretty much easy for anyone with access to your iPhone to bypass the passcode protection (doesn't matter if you configured Touch ID or not) and access your personal photos and messages.

A new critical security flaw discovered in iOS 8 and newer, including 10.2 beta 3, allows anyone to bypass iPhone's passcode and gain access to personal information using the benevolent nature of Apple's personal assistant Siri.

The security glitch has been discovered by EverythingApplePro and iDeviceHelps and now that they have gone public with a video demonstration, you can expect Apple to fix this issue in the next iOS beta version.

All an attacker need is to find out the phone number of the target's iPhone and access to the phone for a few minutes.

But, what if you don't have target's phone number? No worries. You can hold down the home button of target's iPhone to activate Siri and simply ask "Who am I?" Siri will reply you with the phone number it is using.

Here's How to bypass iPhone's Lockscreen:


Once you got the phone number, follow these simple steps to reading personal messages and accessing personal photos on target's iPhone:

Step 1: Since now you have target's phone number, call on his/her iPhone – starting a FaceTime call will also do it.

Step 2: Now, targets iPhone screen will show a message icon, just click on 'Message icon' and then 'Custom Message' to go to the New Message screen where you are allowed to type a reply.

Step 3: Next, you need to activate Siri by long-pressing the Home button and say "Turn on Voice Over," and Siri will get the job done by turning it ON.

Step 4: Go back to the message screen and double tap the bar where you are required to enter the caller's name and then hold, while immediately click on the keyboard. This may not succeed in the first time, so repeat this step until you see a slide-in effect on the iPhone's screen above the keyboard.

Step 5: Now, ask Siri to "Turn off VoiceOver," come back to messages and simply type in the first letter of a caller's name in the top bar, tap ⓘ icon next to it, and then create a new contact.

Step 6: Next, you can select add photo and choose a photo. Yes, now you are in and can look at the victim's photo gallery just like you are browsing the phone, even though the iPhone is still in the locked state.

Step 7: You can select any contact on the iPhone, and you would be able to see all previous conversations of the target with that contact.

Video Demonstration

You can also watch a video demonstration that shows the complete hack in action.

How to Protect Yourself Against this Flaw?


Until Apple fixes this issue, iOS users can protect themselves by disabling Siri on the lock screen, though it will cripple your iOS 10 experience.

To do so, Go to the Settings → Touch ID & Passcode and Disable Siri on the Lockscreen by toggling the switch to disable.

Once disabled, you will only be able to use Siri after you have unlocked your iOS device using the passcode or your fingerprint.

Alternatively, you can just remove Photos access from Siri. To do so, just go to Settings → Privacy → Photos and then prevent Siri from accessing pictures.

Apple is most likely aware of the flaw, so iPhone users can expect a fix in the next full version of iOS 10.2.

Tagged as:
About the Author

I'm a Sufyan Minhas 16 Years Old Young Boy From Lahore Pakistan. I'm a WebMaster of the Pkhackingtricks.blogspot.com. Blogger and SEO Expert. Love to serve myself by sharing Tutorials, Tips Tricks about Internet, Computer Search Engine Optimization, Blogging Ideas. Facebook Account: https://www.facebook.com/HaCkeRnCraCkeR ..

0 comments:

Subscribe
Get our latest posts directly in your email inbox.Click on RSS

Google+ Badge

Followers

Copyright © 2016 Hacking Tips and Tricks Designed By Sufyan Hacker
back to top
' type='text/javascript'/>