Skip to main content

How to Bypass iphone Passcode to Access Photos and Messages



Setting a passcode on your iPhone is the first line of defense to help prevent other people from accessing your personal details.

However, it's pretty much easy for anyone with access to your iPhone to bypass the passcode protection (doesn't matter if you configured Touch ID or not) and access your personal photos and messages.


A new critical security flaw discovered in iOS 8 and newer, including 10.2 beta 3, allows anyone to bypass iPhone's passcode and gain access to personal information using the benevolent nature of Apple's personal assistant Siri.



The security glitch has been discovered by EverythingApplePro and iDeviceHelps and now that they have gone public with a video demonstration, you can expect Apple to fix this issue in the next iOS beta version.



All an attacker need is to find out the phone number of the target's iPhone and access to the phone for a few minutes.


But, what if you don't have target's phone number? No worries. You can hold down the home button of target's iPhone to activate Siri and simply ask "Who am I?" Siri will reply you with the phone number it is using.


Here's How to bypass iPhone's Lockscreen:



Once you got the phone number, follow these simple steps to reading personal messages and accessing personal photos on target's iPhone:

Step 1: Since now you have target's phone number, call on his/her iPhone – starting a FaceTime call will also do it.



Step 2: Now, targets iPhone screen will show a message icon, just click on 'Message icon' and then 'Custom Message' to go to the New Message screen where you are allowed to type a reply.

Step 3: Next, you need to activate Siri by long-pressing the Home button and say "Turn on Voice Over," and Siri will get the job done by turning it ON.

Step 4: Go back to the message screen and double tap the bar where you are required to enter the caller's name and then hold, while immediately click on the keyboard. This may not succeed in the first time, so repeat this step until you see a slide-in effect on the iPhone's screen above the keyboard.

Step 5: Now, ask Siri to "Turn off VoiceOver," come back to messages and simply type in the first letter of a caller's name in the top bar, tap ⓘ icon next to it, and then create a new contact.

Step 6: Next, you can select add photo and choose a photo. Yes, now you are in and can look at the victim's photo gallery just like you are browsing the phone, even though the iPhone is still in the locked state.

Step 7: You can select any contact on the iPhone, and you would be able to see all previous conversations of the target with that contact.

How to Protect Yourself Against this Flaw?

Until Apple fixes this issue, iOS users can protect themselves by disabling Siri on the lock screen, though it will cripple your iOS 10 experience.

To do so, Go to the Settings → Touch ID & Passcode and Disable Siri on the Lockscreen by toggling the switch to disable.

Once disabled, you will only be able to use Siri after you have unlocked your iOS device using the passcode or your fingerprint.

Alternatively, you can just remove Photos access from Siri. To do so, just go to Settings → Privacy → Photos and then prevent Siri from accessing pictures.

Apple is most likely aware of the flaw, so iPhone users can expect a fix in the next full version of iOS 10.2.




Enjoy.....:))

Comments

Popular posts from this blog

The Web Application Hackers Handbook(Full Pdf)

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about  Advanced Penetration Testing.  This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications. If you want to learn how to run port scans, attack firewalls, or break into servers in other ways, we suggest you look elsewhere. But if you want to know how to hack into a web application, steal sensitive data, and perform unauthorized actions, this is the book for you. There is enough that is interesting and fun to say on that subject without straying into any other territory. Contents:- Chapter 1 Web Applic...

Ethical Hacking Modules And Pdf Full Download

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about Ethical Hacking Modules. Here Download All Module(Pdf) Content Module 01 Exploit Writing Module 02 Using Metasploit Framework Module 03 Footprinting Module 04 Google Hacking Module 05 Scanning Module 06 Enumeration Module 07 System Hacking Module 08 Trojans and Backdoors Module 09 Viruses and Worms Module 10 Sniffers Module 11 Social Engineering Module 12 Phishing Module 13 Hacking Email Accounts Module 14 Denial of Service Module 15 Session Hijacking Module 16 Hacking Webservers Module 17 Web Application Vulnerabilities Module 18 Web based Password Cracking Techniques Module 19 SQL Injection Module 20 Hacking Wireless Networks Module 21 Physical Security Module 22 Linux Hacking Module 23 Evading IDS Firewall and Honeypot Module 24 Buffer Overflows Module 25 Cryptography Module 26 Penetration Testing Module 28 Wri...

Computer Security Fundamentals(3rd Edition)

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about   Computer Security and this book is best for learning about Computer Security and Fundamentals of hackings. content 1 Introduction to Computer Security 2 Networks and the Internet 3 Cyber Stalking, Fraud, and Abuse 4 Denial of Service Attacks  5 Malware  6 Techniques Used by Hackers 7 Industrial Espionage in Cyberspace 8 Encryption  9 Computer Security Software  10 Security Policies  11 Network Scanning and Vulnerability Scanning  12 Cyber Terrorism and Information Warfare 13 Cyber Detective 14 Introduction to Forensics  This book is not a cookbook for hackers. You will see exactly how hackers target a system and get information about it. You will also see step-by-step instructions on how to use some password cracking utilities and some network-scanning utilities....