Pages Menu
Categories Menu

Posted by on Aug 20, 2012 in Software |

Android: The blocking pattern may escape

Android: The blocking pattern may escape

Security in mobile devices is something of vital importance today, considering that it’s not like years ago where they could steal as were the numbers of our contacts and information in our text messages. Today we have plenty of data, photos, email accounts and more that are very important in our lives and professions. For this, a new flaw in a mobile operating system is always taken seriously.

This time thanks to researchers and developers at XDA Developers has discovered a new bug in that allows anyone with the necessary knowledge, skip the blocking pattern on a mobile or tablet, and since this method of security used by users of this and other platforms, is worrying.

Of course, mentioning the phrase “anyone with the necessary knowledge,” I mean that when you apply for a mobile force must have basic knowledge of ADB, in addition to the terminal owner must have activated the debug mode. However, a plus for the intruder is the Android device does not need to be Root to escape the blockade.

Once the thief or the offender has the device in their hands, has two methods to bypass the blocking pattern:

First method

Console and through ADB, after connecting the device, enter the following commands:

 adb shell
 cd /data/data/com.android.providers.settings/databases
 sqlite3 settings.db
 update system set value=0 where name='lock_pattern_autolock';
 update system set value=0 where name='lockscreen.lockedoutpermanently';
 .quit

Second method

Even easier than before, but also through ADB, only requires running the following command:

 adb shell rm /data/system/gesture.key 

After applying any of the two methods do not necessarily disappear block pattern to turn the device screen, but it can enter any random pattern and unlock the terminal. A major failure in the security of Android, as many we have this pattern to protect data and information we store on your mobile.

In Gizmodo do not support this kind of action, but warned of its existence so that all users are more attentive to these failures.

M.sabra known as the developer, who discovered this way to bypass the standard security ensures that these methods also could save us trouble, because we serve to access our terminal in which case you forget the lock pattern . It also recommends having disabled the debug mode on the device as a security measure against possible criminals with this knowledge, in which case we lose our Android.

Finally, m.sabra video shows how they work in their methods.

Image: BGR

Tags: ,