• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

New iPhone Passcode Bypass Hack Exposes Photos and Contacts

October 10, 2018 by Nishit Darade 1 Comment

New iPhone Passcode Bypass Hack Exposes Photos and Contacts

– Wang Wei

Jose Rodriguez, an iPhone enthusiast, has discovered a passcode bypass vulnerability in Apple’s new iOS version 12 that potentially allows an attacker to access photos and contacts, including phone numbers and emails, on a locked iPhone XS and other recent iPhone models.

The attacker can begin the complicated 37-step iPhone passcode bypass process by tricking Siri and iOS accessibility feature called VoiceOver to sidestep the iPhone’s passcode and access users the contacts stored in the iPhone, including phone numbers and email addresses, and to access Camera Roll and other photo folders, by selecting a contact to edit and change its image.

Until Apple comes up with a fix, you can temporarily fix the issue by just disabling Siri from the lock screen.

Please refer to the video attached in the article for the iPhone passcode bypass hack.

Reference: https://thehackernews.com/2018/10/iphone-passcode-bypass-hack.html

Filed Under: Week 06: Sniffers Tagged With:

Reader Interactions

Comments

  1. Raaghav Sharma says

    October 17, 2018 at 6:37 pm

    This is really interesting because apple claims to have fixed it in ios version 12.0.1 but the research says that even the latest version is susceptible to the attack.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2026 · Magazine Pro Theme on Genesis Framework · WordPress · Log in