• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 13th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News
iPhone

A $500 Device can Crack iPhone 6 and 7 Passcodes within Minutes

August 22nd, 2017 Uzair Amir Security, iPhone, Technology News 0 comments
A $500 Device can Crack iPhone 6 and 7 Passcodes within Minutes
Share on FacebookShare on Twitter

If you remember the FBI paid millions of dollars to Israeli firm Cellebrite to unlock San Bernardino gunman’s iPhone. Now, it turns out that a $500 device that can recover passcodes of not one or two but three iPhone 7 at the same time. Believe it or not but this American YouTuber has posted a video showing a device just the size of a phone retrieving the iPhone passcode in a jiffy.

Called the iPhone Unlocker, the device has been produced in China, and the YouTuber probably bought it online. Wondering how it performs this humongous task?

More: Textalyzer Device Tells Police Everything Users Do on Their Smartphone

It doesn’t bypass passcode, but the device enters the passcodes in sequence such as 0000, 0001, etc. it is worth noting that the device can try out passwords on at least three iPhones simultaneously. The process continues until the correct password is retrieved. The phone’s reaction to the entered passcode serves as an indicator of passcode’s accuracy. The code is noted from the device and entered into the phone when the lock screen is displayed.

However, the trick seems unreal because let’s face the fact; it is The iPhone… It is seemingly impossible to retrieve the correct passcode by continually trying out different combinations just because the phone doesn’t allow too many wrong guesses. So how does it happen with the device?

The video explains about it as well. It says that there are certain situations such as halfway through a firmware update when it is possible to try out passwords because the phone won’t get locked after multiple wrong guesses. Believably the device exploits similar situations to keep on entering a series of numbers.

However, the trick isn’t as easy to pull off as you might be thinking because there are salient conditions without which the method won’t work. For instance, it is important that you have recently changed your password. TechCrunch explains that the password must be changed at the last minute if you want to make unending guesses. Secondly, forcing the phone to run a firmware update is important to create a situation that would allow entering of passwords. Thirdly, the password must be brief.

The device will try six passwords in a minute, and this means the guessing rate is much slower (twenty times slower according to TechCrunch) if you changed your password about ten minutes, ago.

[fullsquaread][/fullsquaread]

The video shows that three iPhones were cracked within 12 minutes but it was evident that the phones were deliberately configured with similar passcodes, that is, 0015, 0016 and 0012. The device started guessing the passcode from 0000 so guessing the correct passcode wasn’t a big deal. Let’s assume that you have a 6-digit password and you haven’t changed your password in past few minutes then the gizmo trick is useless as it will keep entering codes for as long as ten years. The reason is that every extra digit will slow down the guessing time by a factor of 10. So, a seven digit password will take a few decades to be retrieved.

This means, even someone steals your iPhone, this device trick will only work if your password is short and belongs to the list of easy-to-guess codes such as 123456, 5683 or 111111. Remember that the method works only on some models of iPhone 6 and 6s while it is fully compatible on iPhone 7 and 7 Plus. However, we do know that the flaw will soon be eliminated in the upcoming iOS 11.

More: You can buy password stealing malware ‘Ovidiy Stealer’ for $7

The device manufacturer is advertising the product quite fiercely instead of promoting it discreetly primarily because it eventually will become worthless after the shipping of iOS 11.

But still, users need to stay cautious. Always keep your phone close to you if you have changed your password and select a lengthy passcode (6 digits long password is the current average, so we suggest you select longer than that). Most importantly, upgrade to iOS 11 immediately after it comes out.

Watch the demonstration below:

  • Tags
  • Gadget
  • hacking
  • internet
  • iPhone
  • Password
  • Privacy
  • security
  • Smartphone
Facebook Twitter LinkedIn Pinterest
Previous article New Fileless Cryptocurrency Miner Hits Windows Using EternalBlue Flaw
Next article US Navy investigating whether its crashed ship was hacked (Updated)
Uzair Amir

Uzair Amir

I am an Electronic Engineer, an Android Game Developer and a Tech writer. I am into music, snooker and my life motto is 'Do my best, so that I can't blame myself for anything.'

Related Posts
Researcher release PoC exploit for 0-day in Chrome, Edge, Brave, Opera

Researcher release PoC exploit for 0-day in Chrome, Edge, Brave, Opera

6-year-old Moodle flaw exposed millions to account takeover attack

6-year-old Moodle flaw exposed millions to account takeover attack

Scraped data of 1.3 million Clubhouse users published online

Scraped data of 1.3 million Clubhouse users published online

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Researcher release PoC exploit for 0-day in Chrome, Edge, Brave, Opera
Security

Researcher release PoC exploit for 0-day in Chrome, Edge, Brave, Opera

ShinyHunters dump partial database of broker firm Upstox
Hacking News

ShinyHunters dump partial database of broker firm Upstox

6-year-old Moodle flaw exposed millions to account takeover attack
Security

6-year-old Moodle flaw exposed millions to account takeover attack

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us