• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 02: TCP/IP and Network Architecture

Article 2: IOS 13 Lock Screen Lets Anyone See Your Address Book

September 15, 2019 by Imran Jordan Kharabsheh Leave a Comment

This article, originally posted by the British publication The Register, highlights a vulnerability that was recently made public by a researcher that would allow an unauthorized user to gain access to the address book of any device using the iOS operating system. The publication and video that is included demonstrate how this exploit is replicated, albeit in a surprisingly simple way. All it requires is that someone calls the iOS device and opts to reply with a text message, thereby bypassing the lock screen and bringing you directly into the device’s address book. While the respond with a text feature can be disabled by delving through long list of sometimes complicated settings, this exploitable feature is always enabled automatically on all iOS devices. Being the owner of not one, but three apple products that use Apple’s iOS operating system, I am less than thrilled at the discovery of such a surface level GUI vulnerability. Thankfully, the article follows up by notifying people of a fix coming within the next two weeks that would remove this particular vulnerability permanently.

 

Source: https://apple.slashdot.org/story/19/09/15/004237/ios-13-lock-screen-lets-anyone-see-your-address-book

Filed Under: Week 02: TCP/IP and Network Architecture Tagged With:

Week 2 Presentation and Video Link

September 14, 2019 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-2

https://capture.fox.temple.edu/Mediasite/Play/47cb2db10f054c538c7060ea4ac404531d

Filed Under: Week 02: TCP/IP and Network Architecture Tagged With:

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in