Upload
fahadullah-khan-afridi
View
216
Download
0
Embed Size (px)
Citation preview
7/25/2019 muslim education sytem
1/3
How the iPhone Activation Lock hack works
4K
Alex Heath(5:00 am PDT, May 2r! 20"#$
image: http://cdn.cultofmac.com/wp-content/uploads/2014/05/20140522_nd-
myphone_0013-nal-40!4"3.#pg
$ac%e&s ha'e disco'e&ed an e!ploit that ma%es it easy to defeat the (cti'ation
)oc% on i*hones. *hoto: +im ,e&ithew/ult of ,ac
The recently reveale! ex%loit that allows anyone to &y%ass the iPhone's Activation Lock
systemis a rather sim%le %rocess that re)ires a!!in* +)st a sin*le line o co!e to a
com%)ter r)nnin* iT)nes-
The ex%loit, which is calle! Do)l.i (/i.lo)! &ackwar!$, has alrea!y &een )se!
tho)san!s o times on locke! iPhones an! iPa!s aro)n! the worl!- 1t's the work o a %airo anonymo)s hackers, who cracke! A%%le's thet!eterrent meas)re &y trickin* lost or
stolen i34 !evices into thinkin* they are &ein* reactivate! &y A%%le's servers-
1ntro!)ce! in i34 , Activation Lock is !esi*ne! to ren!er a lost or stolen iPhone )seless
)nless it is recovere! &y its %ro%er owner- 1t's a %ower)l tool !esi*ne! to hel% %rotect
iPhone owners who all victim to street thieves who 6n! A%%le %ro!)cts irresisti&le-
7hen A%%le's 8in! My Phonea%% is t)rne! on, an iDevice can &e tracke! &y its owner
thro)*hi.lo)!-coman! remotely wi%e! i necessary-
http://www.cultofmac.com/280450/heres-easy-hack-past-apples-activation-lock-missing-iphone/http://www.cultofmac.com/author/alex-heath/http://www.cultofmac.com/280189/icloud-hacker-calls-apples-response-little-late/http://www.cultofmac.com/280189/icloud-hacker-calls-apples-response-little-late/http://www.apple.com/icloud/find-my-iphone.htmlhttp://icloud.com/http://icloud.com/http://www.cultofmac.com/author/alex-heath/http://www.cultofmac.com/280189/icloud-hacker-calls-apples-response-little-late/http://www.cultofmac.com/280189/icloud-hacker-calls-apples-response-little-late/http://www.apple.com/icloud/find-my-iphone.htmlhttp://icloud.com/http://www.cultofmac.com/280450/heres-easy-hack-past-apples-activation-lock-missing-iphone/7/25/2019 muslim education sytem
2/3
4ay a thie snatches an iPhone, it *ets remotely wi%e! &y the owner, an! the thie
attem%ts to restore the iPhone so it can &e )se! a*ain as a new !evice- That's when
Activation Lock comes into %lay- D)rin* the set)% %rocess ater a restore, the A%%le 1D
an! %asswor! ori*inally associate! with the !evice nee!s to &e entere!- 1 that lo*in ino
can't &e %rovi!e!, the iPhone can't &e reactivate! with A%%le's i.lo)! servers- 9o) have
a &ricke! iPhone that can't *et %ast the initial set)%- All it's *oo! or is s%are %arts-
y %erormin* what is commonly reerre! to as a maninthemi!!le attack, the Do)l.i
ex%loit interce%ts we& tra;c &etween the iPhone an! A%%le's servers-
$e&es how ouli wo&%s"$ The 6rst ste% is to e!it yo)r com%)ter's hosts 6le an! a!! a line o co!e that %oints to
Do)l.i's server- The 1P a!!ress o Do)l.i's server, "
7/25/2019 muslim education sytem
3/3
%rocess that varies !e%en!in* )%on which o%eratin* system yo) are )sin*- Here's a
*oo! overviewo how to e!it the hosts 6le on !i@erent Mac an! 7in!ows systems-
2$ The loststolen iPhone is then %l)**e! into a Mac or P. r)nnin* iT)nes an! %)t
into D8?Becovery mo!e- To !o this, t)rn o@ the !evice- T)rn it &ack on, hol!in* !own
the 4lee%7ake &)tton or three secon!s, an! then C witho)t releasin* the 4lee%7ake
&)tton C &e*in hol!in* the Home &)tton or an a!!itional "0 secon!s- Belease the
4lee%7ake &)tton &)t kee% hol!in* the Home &)tton )ntil iT)nes reco*nies yo)r
!evice an! Becovery mo!e &e*ins- iT)nes will restore the iPhone to a &lank state, an!
the normal set)% %rocess &e*ins while the iPhone is connecte! to the com%)ter with
iT)nes o%en-
$ This is where thin*s *et sha!y- 7hen the !evice attem%ts to contact A%%le's server to
see i it nee!s to &e activate!, the line a!!e! to the hosts 6le rero)tes the %in* thro)*h
Do)l.i's servers instea!- The iPhone thinks it's talkin* to A%%le when it's really talkin*
to the hackers' server-
he i*hone thin%s its tal%ing to (pple when its &eallytal%ing to ouli.
At this %oint, the hackers r)nnin* Do)l.i's servers co)l! ca%t)re !evice ino, s)ch as
serial n)m&ers an! other )ni)e i!enti6ers- However, sec)rity researcher an! i34
hacker 4teven De 8rancotol! .)lt o Mac that no cre!it car! or other %ersonal
inormation tie! to the ori*inal owner can &e swi%e!- /?nless they have access to
A%%le's !ata&ase, they can't !o m)ch, he sai!- /Even then F 1 think the most they
co)l! %)ll )% is &illin* ino- esi!es, i the !evice &ein* )nlocke! was stolen in the 6rst
%lace, the %erson )sin* the ex%loit likely !oesn't care a&o)t sharin* its serial n)m&er
with a mysterio)s server-
#$ Ater the Do)l.i servers have s%ooe! the activation re)est, the iPhone is *oo! to *o
as tho)*h it has &een a)thenticate! with the owner's A%%le 1D lo*in- 4ort oF
he , ca&d p&olemThe catch is that ater the ex%loit, the iPhone's 41M car! won't &e reco*nie!- The 41M is&locke! &eca)se i34 has &een tricke! into thinkin* it has &een activate!, while the
iPhone's &ase&an! (the 6rmware that comm)nicates an! a)thenticates the !evice with
the carrier$ has not- The iPhone won't connect to a wireless carrier &)t can &e )se! or
all other )nctions-
The hackers &ehin! Do)l.i tol! .)lt o Mac their techni)e works on all i34 !evices-
They claim to have a 6x or the 41M&lockin* iss)e in the works-
A%%le has not res%on!e! to .)lt o Mac's re)ests or comment-
Bea! more at htt%:www-c)ltomac-com2