Passcode? What passcode? Software can brute force its way on jailbroken iOS devices

Passcode? What passcode? Software can brute force its way on jailbroken iOS devices
Jailbreaking an iOS device unleashes a lot of great potential for those that want more from their iPhone. It is akin to taking the leash off and removing the fence, it opens a world of possibilities.

Of course, that also potentially opens the world to your device as well. Recently some folks assembled some hardware, literally a little black box, that could brute-force its way through the PIN lock on an iPhone, jailbroken or not, running iOS 8.1 or later. The trick was that it could cut power to the device before it could log the failed attempt, thus not triggering the passcode counter.

Now, someone has developed a software solution called TransLock, a brute force utility program. The difference however, is that TransLock will only work on jailbroken iOS devices. Unlike a locked down device, the utility can simply override any retry limit since the typical software limits have been bypassed, enabling the program to work through a different four-number combination every 5 seconds.

Naturally the workaround is to use a stronger character-based password. Of course, even then there is no guarantee given how most of us are with passwords too. TransLock can be found through portals like GitHub, though the maker, Majd Alfhaily, says he will distribute it as well.



source: Redmond Pie

FEATURED VIDEO

2 Comments

1. PapaSmurf

Posts: 10457; Member since: May 14, 2012

My iPhone is Jailbroken on 8.1..........

3. xondk

Posts: 1904; Member since: Mar 25, 2014

Well jailbroken/rooted phones are always at a bigger risk then those that are not, so is this really a surprise? I'm quite sure there are apps or such out there that are just one wrong install away from controlling and maliciously using your jailbroken/rooted phone.

Latest Stories

This copy is for your personal, non-commercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers at https://www.parsintl.com/phonearena or use the Reprints & Permissions tool that appears at the bottom of each web page. Visit https://www.parsintl.com/ for samples and additional information.