Passwords stored on a locked iPhone retrieved for six minutes using off-the-shelf exploits
Then the researchers copied a Keychain (Apple's password management system) access script, and executed it to ultimately spill out the account passwords which are stored there. It was possible, because the cryptographic key is based on code you can find in the iOS device itself, and is not tied up to the passcode.
Thus the guys from the Fraunhofer Institute managed to retrieve the Gmail, Wi-Fi and some apps passwords, as well as the MS Exchange pass and the corporate VPN access code. The last two are particularly troubling, considering Apple is fighting hard to spearhead iOS devices adoption in the enterprise, even poaching talent from RIM.
To add insult to injury, it took the researchers a whole of six minutes with physical access to the phone to retrieve all of the above info. They even recorded it on video, so if someone didn't know before how to do it, now they can.
1. xxA4Hxx (unregistered)
This concerns me, might just force me to get an atrix next.
2. Bada Bing (unregistered)
It is much easier to get access to all mail passwords in a bada phone. Passwords are saved as plain text. You just need an micro-usb cable, sTune and about 30 seconds of time...
3. Freshy KHan (unregistered)
So did these iphones have their memories completely erased prior to using the phones or was it just some return that a user neglected to clear?
Thats a whole different story, then.
4. protozeloz (Posts: 5378; Member since: 16 Sep 2010)
don't know..... could even be a stolen phone for all what matters
5. protozeloz (Posts: 5378; Member since: 16 Sep 2010)
I think they kinda went too far for posting this stuff on the net to prove their point, unless the tools are inaccessible then its an invitation to exploitation... but at least apple may work on this
6. kanon (Posts: 36; Member since: 09 Dec 2010)
LOL Suck it all the people that were saying they were going to go to apple because of the McCafee post lol suck it so hard