Menu

Shaquib Izhar Shaquib Izhar Author
Title: Android 5.x lockscreen bypass vulnerability
Author: Shaquib Izhar
Rating 5 of 5 Des:
A latest vulnerability found in Android version 5.x by  security analyst at the University of Texas’s information security office in Au...


A latest vulnerability found in Android version 5.x by security analyst at the University of Texas’s information security office in Austin that allow an attacker crash the lock screen by crashing the system UI and gain complete access to the device.This can be done by entering a large string in the password field when the camera is running by using this anyone can bypass the lock screen.

This exploit only work when the owner is using Password set because pattern and pin can't be exploit using this method


So let the hack begin
(Screen shot credits goes to its respective owner)

1. First from the lock screen open emergency call


2. Type a few characters, e.g. 10 asterisks. Double-tap the characters to highlight them and tap the copy button. Then tap once in the field and tap paste, doubling the characters in the field. Repeat this process of highlight all, copy, and paste until the field is so long that double-tapping no longer highlights the field. This usually occurs after 11 or so repetitions.

02-dialer03-dialer-asterisks04-dialer-copy05-dialer-paste06-dialer-nocopy

3 Go back to the lockscreen, then swipe left to open the camera. Swipe to pull the notification drawer down from the top of the screen, then tap the Settings (gear) icon in the top right. This will cause a password prompt to appear.

07-camera08-camera-settings09-camera-password
4. Long-tap in the password field and paste the characters into it. Continue to long-tap the cursor and paste the characters as many times as possible, until you notice the UI crash and the soft-buttons at the bottom of the screen disappear, expanding the camera to fullscreen. Getting the paste button can be finicky as the string grows. As a tip, always make sure the cursor is at the very end of the string (you can double-tap to highlight all then tap towards the end to quickly move the cursor there) and long-tap as close to the center of the cursor as possible. It may take longer than usual for the paste button to appear as you long-tap.

10-camera-paste11-camera-pasted12-camera-secondpaste13-crash-nosoftkeys
5. Wait for the camera app to crash and expose the home screen. The duration and result of this step can vary significantly but the camera should eventually crash and expose sensitive functionality. You should notice the camera lagging as it attempts to focus on new objects. Taking pictures via the hardware keys may speed up the process, though it is not strictly necessary. If the screen turns off due to inactivity, simply turn it back on and continue waiting. In some cases the camera app will crash directly to the full home screen as seen below, whereas other times it may crash to a partially rendered homescreen as seen in this

13-crash-nosoftkeys14-crash-background15-crash-desktop
6. Navigate to the Settings application by any means possible, e.g. by tapping the app drawer button in the bottom center and finding it in the app list. At this point it is possible to enable USB debugging normally (About phone > tap Build number 7 times, back, Developer options > USB debugging) and access the device via the adb tool to issue arbitrary commands or access the files on the device with the full permissions of the device owner.

16-settings17-settings-about18-settings-developer


About Author

Advertisement

Post a Comment

 
Top