muslim education sytem

Embed Size (px)

Citation preview

  • 7/25/2019 muslim education sytem

    1/3

    How the iPhone Activation Lock hack works

    4K

    Alex Heath(5:00 am PDT, May 2r! 20"#$

    image: http://cdn.cultofmac.com/wp-content/uploads/2014/05/20140522_nd-

    myphone_0013-nal-40!4"3.#pg

    $ac%e&s ha'e disco'e&ed an e!ploit that ma%es it easy to defeat the (cti'ation

    )oc% on i*hones. *hoto: +im ,e&ithew/ult of ,ac

    The recently reveale! ex%loit that allows anyone to &y%ass the iPhone's Activation Lock

    systemis a rather sim%le %rocess that re)ires a!!in* +)st a sin*le line o co!e to a

    com%)ter r)nnin* iT)nes-

    The ex%loit, which is calle! Do)l.i (/i.lo)! &ackwar!$, has alrea!y &een )se!

    tho)san!s o times on locke! iPhones an! iPa!s aro)n! the worl!- 1t's the work o a %airo anonymo)s hackers, who cracke! A%%le's thet!eterrent meas)re &y trickin* lost or

    stolen i34 !evices into thinkin* they are &ein* reactivate! &y A%%le's servers-

    1ntro!)ce! in i34 , Activation Lock is !esi*ne! to ren!er a lost or stolen iPhone )seless

    )nless it is recovere! &y its %ro%er owner- 1t's a %ower)l tool !esi*ne! to hel% %rotect

    iPhone owners who all victim to street thieves who 6n! A%%le %ro!)cts irresisti&le-

    7hen A%%le's 8in! My Phonea%% is t)rne! on, an iDevice can &e tracke! &y its owner

    thro)*hi.lo)!-coman! remotely wi%e! i necessary-

    http://www.cultofmac.com/280450/heres-easy-hack-past-apples-activation-lock-missing-iphone/http://www.cultofmac.com/author/alex-heath/http://www.cultofmac.com/280189/icloud-hacker-calls-apples-response-little-late/http://www.cultofmac.com/280189/icloud-hacker-calls-apples-response-little-late/http://www.apple.com/icloud/find-my-iphone.htmlhttp://icloud.com/http://icloud.com/http://www.cultofmac.com/author/alex-heath/http://www.cultofmac.com/280189/icloud-hacker-calls-apples-response-little-late/http://www.cultofmac.com/280189/icloud-hacker-calls-apples-response-little-late/http://www.apple.com/icloud/find-my-iphone.htmlhttp://icloud.com/http://www.cultofmac.com/280450/heres-easy-hack-past-apples-activation-lock-missing-iphone/
  • 7/25/2019 muslim education sytem

    2/3

    4ay a thie snatches an iPhone, it *ets remotely wi%e! &y the owner, an! the thie

    attem%ts to restore the iPhone so it can &e )se! a*ain as a new !evice- That's when

    Activation Lock comes into %lay- D)rin* the set)% %rocess ater a restore, the A%%le 1D

    an! %asswor! ori*inally associate! with the !evice nee!s to &e entere!- 1 that lo*in ino

    can't &e %rovi!e!, the iPhone can't &e reactivate! with A%%le's i.lo)! servers- 9o) have

    a &ricke! iPhone that can't *et %ast the initial set)%- All it's *oo! or is s%are %arts-

    y %erormin* what is commonly reerre! to as a maninthemi!!le attack, the Do)l.i

    ex%loit interce%ts we& tra;c &etween the iPhone an! A%%le's servers-

    $e&es how ouli wo&%s"$ The 6rst ste% is to e!it yo)r com%)ter's hosts 6le an! a!! a line o co!e that %oints to

    Do)l.i's server- The 1P a!!ress o Do)l.i's server, "

  • 7/25/2019 muslim education sytem

    3/3

    %rocess that varies !e%en!in* )%on which o%eratin* system yo) are )sin*- Here's a

    *oo! overviewo how to e!it the hosts 6le on !i@erent Mac an! 7in!ows systems-

    2$ The loststolen iPhone is then %l)**e! into a Mac or P. r)nnin* iT)nes an! %)t

    into D8?Becovery mo!e- To !o this, t)rn o@ the !evice- T)rn it &ack on, hol!in* !own

    the 4lee%7ake &)tton or three secon!s, an! then C witho)t releasin* the 4lee%7ake

    &)tton C &e*in hol!in* the Home &)tton or an a!!itional "0 secon!s- Belease the

    4lee%7ake &)tton &)t kee% hol!in* the Home &)tton )ntil iT)nes reco*nies yo)r

    !evice an! Becovery mo!e &e*ins- iT)nes will restore the iPhone to a &lank state, an!

    the normal set)% %rocess &e*ins while the iPhone is connecte! to the com%)ter with

    iT)nes o%en-

    $ This is where thin*s *et sha!y- 7hen the !evice attem%ts to contact A%%le's server to

    see i it nee!s to &e activate!, the line a!!e! to the hosts 6le rero)tes the %in* thro)*h

    Do)l.i's servers instea!- The iPhone thinks it's talkin* to A%%le when it's really talkin*

    to the hackers' server-

    he i*hone thin%s its tal%ing to (pple when its &eallytal%ing to ouli.

    At this %oint, the hackers r)nnin* Do)l.i's servers co)l! ca%t)re !evice ino, s)ch as

    serial n)m&ers an! other )ni)e i!enti6ers- However, sec)rity researcher an! i34

    hacker 4teven De 8rancotol! .)lt o Mac that no cre!it car! or other %ersonal

    inormation tie! to the ori*inal owner can &e swi%e!- /?nless they have access to

    A%%le's !ata&ase, they can't !o m)ch, he sai!- /Even then F 1 think the most they

    co)l! %)ll )% is &illin* ino- esi!es, i the !evice &ein* )nlocke! was stolen in the 6rst

    %lace, the %erson )sin* the ex%loit likely !oesn't care a&o)t sharin* its serial n)m&er

    with a mysterio)s server-

    #$ Ater the Do)l.i servers have s%ooe! the activation re)est, the iPhone is *oo! to *o

    as tho)*h it has &een a)thenticate! with the owner's A%%le 1D lo*in- 4ort oF

    he , ca&d p&olemThe catch is that ater the ex%loit, the iPhone's 41M car! won't &e reco*nie!- The 41M is&locke! &eca)se i34 has &een tricke! into thinkin* it has &een activate!, while the

    iPhone's &ase&an! (the 6rmware that comm)nicates an! a)thenticates the !evice with

    the carrier$ has not- The iPhone won't connect to a wireless carrier &)t can &e )se! or

    all other )nctions-

    The hackers &ehin! Do)l.i tol! .)lt o Mac their techni)e works on all i34 !evices-

    They claim to have a 6x or the 41M&lockin* iss)e in the works-

    A%%le has not res%on!e! to .)lt o Mac's re)ests or comment-

    Bea! more at htt%:www-c)ltomac-com2