Home Tech Apps & Software How To HACK Android Pattern Lock

How To HACK Android Pattern Lock

Spread the love

How To HACK Any Android Pattern Lock

lock screen is a computer user interface element used by various operating systems. They regulate immediate access to a device by requiring that the user perform a certain action in order to receive access, such as entering a password, using a certain button combination, or performing a certain gesture using a device’s touchscreen.

While most lock functions on PC operating systems only utilize a login screen, lock screens on mobile devices often provide more functionality beyond unlocking the phone: such as notifications for emails and text messages, a date and time display, or shortcuts to certain applications.

Image result for Android Pattern Lock

At first, Android did not use a gesture-based lock screen, electing to require the user to press the phone’s Menu button. On Android 2.0, a new gesture-based lock screen was introduced, displaying two icons: one for unlocking the phone, and one for setting the volume mode, activated by dragging the relevant icon to the center of the screen on a curve (similarly to a rotary dial). On Android 2.1, the rotary dial was replaced by two tabs on either end of the screen. Android 3.0 introduced a new design: a ball with a padlock icon is dragged to the outside of a circular area. On 4.0, the option to unlock straight to the camera is provided, while 4.1 adds the ability to unlock into a Google Search screen by dragging up.

Android 4.2 makes additional changes to the lock screen, allowing users to add widgets to pages accessible on the lock screen by swiping from the left edge of the screen. The camera is accessed in a similar manner by swiping from the right edge of the screen. Android also allows devices to be locked using a password, passcode, a pattern on a grid of 9 circles, fingerprint sensing, or with facial recognition.

READ  Best 4 Ways that Researching Reviews Can Help you Find the Best Web Host in India

A sonar works by emitting acoustic signals underwater, hence, these are the waves that travel in the marine environment and when they collide with an object they bounce, thus returning to the starting point. Usually, a submarine or a ship simply interprets the signals and maps the bottom recording simply to recognize the possible dangers.

According to the latest reports, recently, a study conducted jointly by the researchers of some well-known universities which clearly shows that the Android unlock pattern can be hacked easily simply by using this easy method.

Image result for Android Pattern Lock

The technology developed rapidly during World War I and has been perfected over the years. A century later, a team of researchers from the University of Lancaster (United Kingdom) and Linkoping (Sweden) talk about hacking an Android phone by entering through its unlock pattern.

To achieve this, they have previously had to convert the phone into a sonar. Nothing strange if we take into account that a smartphone does not emit sound waves, but radio waves.

Hence, to solve this “problem”, researchers send sounds (inaudible to humans) through the speakers and collect (through the microphone) the echo that occurs when someone draws their unlock pattern on the screen. Then send the data to an external server, train them with machine learning (automatic learning) and in a few minutes, the system returns the password to enter in the Android device.

In an unlock pattern there are 400,000 possible combinations. Researchers from both universities have relied on a previous study that ensured that only by entering 12 combinations, 20% of the Android devices that currently present on the market are hackable. From here they have developed and trained sonarSnoop (the name they have given to the software), getting in just four attempts to guess one of those 12 combinations. For this, the attacker has to enter the victim’s phone or, at least, gain access to the speaker and microphone.

READ  Deliveroo App Review

Only in August of last year, more than 300 apps that allowed DDoS attacks against other devices around the world swarmed the shelves of the Google Play Store. In May 2017 a team of independent researchers published that the Play Store had up to 234 applications that asked to access the phone’s microphone.

To carry out the study, “we assumed that a malware posing as a good application was downloaded to the victim’s smartphone,” Peng Cheng, one of the authors of the study published on arxiv.org.

The malware does not have to block the phone, slow it down or show permanent banners, simply it only needs to gain access to the microphone and the speaker. “It is not uncommon for an installed application to use them, it is very likely that the user will not notice the attack,” he continues.

Once the mobile is infected, the speakers begin to emit sounds at a frequency between 18 and 20KHz so that, each time the victim draws the pattern, the resulting echo bounces off the audio waves and the sonar effect occurs.

It is not an instant technique since “the attacker will have to observe a series of unblocks”, according to Peng. Even if it only takes a few seconds to draw it, analyzing the data is longer: this is where automatic learning comes into play.

The implications on the Internet of Things

“This happens after the data is saved and sent to a remote server controlled by the attacker,” continues the researcher. This is where the software is trained and its efficiency is improved in the face of future attacks.

READ  World of Warships - Game Update 0.6.7

When it was asked if they have already tried their technique to try to unlock protected mobile phones with an unlock code, Peng said no. That’s why they have not yet tested it on any Apple iPhones. However, the iPhones of the tech giant Apple are not impossible: another Chinese team of researchers managed to hack them through ultrasound a year ago.

Ibrahim Ethem Bagci, Utz Roedig, and Jeff Van are the other three researchers who sign the work with Peng. Beyond the fact that his technique is feasible and serves to reveal unlocking patterns, the implications are more worrisome.

It is not difficult to think today of intelligent speakers such as Google Home or Amazon Echoconnected to the Network permanently or on the Internet of Things, materialized in televisions, ovens, microwaves, refrigerators, clocks and a host of everyday objects.

“If an attacker controls the audio system of these devices, then he/she can use them to observe the users (movements, positions, gestures etc) Therefore, this will have some security implications that should be considered”, concludes the researcher from the University of Lancaster.

So, what do you think about this? Simply share all your views and thoughts in the comment section below. For the latest tech,social media news and reviews, follow firebebble.com on Twitter, Facebook and Instagram



Load More Related Articles
Load More In Apps & Software
Comments are closed.

Check Also

Top 5 Tips and Tricks for Successful Software Outsourcing

Spread the loveTop 5 Tips and Tricks for Successful Software Outsourcing Software outsourc…