Silviu Posted December 3, 2016 Report Posted December 3, 2016 Mană cerească pentru ciorditorii de aifonuri => Lost and stolen iOS devices could be at risk if ne’er-do-wells learn of this blunt-force method of getting past Activation Lock. No special equipment or technical know-how is required, which means any geek off the streets can do it. Fortunately, it’s easily fixed — but until that happens, you might want to be a little extra careful about leaving your phone unattended. The latest exploit is described by Benjamen Kunz-Mejri, founder of German security outfit Vulnerability Lab. An earlier variation, discovered by Slash Secure’s Hemanth Joseph, affected iOS 10.1 and was reported to Apple in October. Although the company attempted to fix the problem in 10.1.1, adding a twist — literally — the the attack means devices are still vulnerable after the update. When an iOS device’s owner activates Lost Mode through Find my iPhone/iPad, the device is remotely put into Activation Mode, requiring your Apple ID for it to unlock and return it to normal. But logging in requires an internet connection, and for that purpose you can opt to use wi-fi. So the attacker goes to the wi-fi network select screen, and selects “other network.” This is where things get hot. The network name and password fields here have no character limits! Apple wasn’t silly enough to allow arbitrary code execution from the fields, so there’s no serious buffer overflow attack here. But if you put enough characters into both fields (upwards of 10,000) the device will slow down and eventually freeze. Put the device to sleep with a cover, wait a few seconds, and open it up — voila, the home screen! That method worked on 10.1, but with 10.1.1, you have to do a bit of screen rotation and use Night Shift mode. The home screen only shows up for a fraction of a second, but Kunz-Mejri told SecurityWeek that one can get it to stay visible with a well-timed button press. The problem could be fixed with a simple character limit on those fields, a fix Apple apparently overlooked or didn’t have time to implement in the update. TechCrunch has contacted Apple for confirmation and further details, and this post will be updated if we hear back. Sursa: https://techcrunch.com/2016/12/02/copy-and-paste-trick-could-unlock-ios-10-devices-in-lost-mode/ 2 Quote
Silviu Posted December 3, 2016 Author Report Posted December 3, 2016 8 minutes ago, Gecko said: Dupa postul lor despre NSA care punea presiune pe ei sa implementeze un backdoor, si apoi o vulnerabilitate ca asta, intr-un sistem la versiunea nr 10, raportata si inca valida, incep sa cred ca asa arata presiunile NSA pentru implementarea unui backdoor. #numazic Nu cred că ar fi atât de cretini să facă exploit-uri care pot fi descoperite de public. Ar putea face o înțelegere internă pe un exploit priv8 la care doar ei să aibe acces prin anumiți pași/chei de acces unice către sistem. O vulnerabilitate ca asta o poate găsi orice cioban cu puțin noroc, așa că tind să cred că nu e vreun serviciu legat de treaba asta, ci doar o scăpare a lor. #my2cents 1 Quote
recode Posted December 4, 2016 Report Posted December 4, 2016 Testat pe 10.1 si nu merge . E facatura ...FAKE da erroare 53 ce sa fac boss ca nu merge fake scamm 1 Quote
Silviu Posted December 4, 2016 Author Report Posted December 4, 2016 8 hours ago, recode said: Testat pe 10.1 si nu merge . E facatura ...FAKE da erroare 53 ce sa fac boss ca nu merge fake scamm Care parte din "could unlock " nu o înțelegi? Din partea mea sper ca asemenea bug-uri să nu funcționeze vreodată pentru români și pentru alte nații de ciorditori. Știrea e de domeniul securității, în scop de research, nu pentru idioți ce au în sertare telefoane furate și speră să le deblocheze. Câteodată îi dau dreptate maximă lui @aelius legat de oamenii din țara asta. 4 Quote