By, smartwatches 16/06/2022

Engadget Logo Engaget Japanese version of iPhone Passcode release tool GRAYKEY's instruction manual is leaked.Details of all hit attacks are revealed

The "GrayKey" developed and sold by the US venture company Grayshift is a product that claims that even those who do not have a security knowledge can unlock and extract data simply by connecting an iPhone or iPad to a machine.It was rumored that law enforcement agencies in each country, such as the United States and the United Kingdom, were introduced, but it was unknown how to operate and operate it for inconvenient products when publicly known.。

However, the instruction manual passed by GrayShift to the customer (police) was leaked, revealing what the GRAYKEY could do and what was going on.

The basic principle of GrayKey to open the iPhone lock is to launch a brute force attack, a huge string, to a security passcode.It seems that it does not necessarily succeed, but it was reported that the FBI could unlock the iPhone of the US military base gunfire case.

This time, the instructions to the San Diego Police obtained by the Vice Media Technology News Site Motherboard said, "Check if you have appropriate investigation permissions for the requested Apple mobile device."It is written.Whether this investigative authority is specifically whether there is an investigation warrant.

Furthermore, as a method of using GrayKey, the situation is that the power is not unlocked after the power is turned on (BFU), the power supply is already on (AFU), the screen is damaged or the battery level is small.It is explained for each.

The locked iPhone has also been revealed that an agent (software that attacks Blue Force attacks) can be installed for 2-3 % of the battery level.However, it is necessary to charge to continue consuming the battery until the passcode is found.

Engadget Logo
エンガジェット日本版 iPhoneパスコード解除ツールGrayKeyの取扱説明書がリーク。総当たり攻撃の詳細が明らかに

For the main purpose of the data, you can choose various methods, such as extracting metadata of files that cannot be accessed and "immediate extraction" after unlocking.

What is interesting is the explanation of the Blue Force attack on the passcode.Here, it is necessary to perform special operations such as reading the word list for the attack (the candidate for the brute force), and the default is "CRACKSTATION-HUMAN-ONLY.Txt".This file contains about 1.5 billion words and passwords (probably not meaningful as a word), but other wordlists can be used.

When the agent is installed on the iPhone side, the iPhone will be in the airplane mode, and it will be able to cancel the connection with GrayKey.In other words, GrayKey is an installation tool that forcibly sits the unlocking and data extraction application to the iPhone.

It also mentions the user's passcode secretly and also mentions the "Hideui" agent that can be used when the police return it to the suspect, and for aftercare that does not leave any traces of GrayKey.It seems to be considered.

Previously, GrayKey was sealed off by iOS 12 and became impossible to decipher the passcode, but since then a few years later, GrayShift is still alive, so he is still working hard to update the passcode.It seems that itachi pretend with Apple, who hardens security, is continuing.

The introduction of a new product of the data extraction tools should naturally lead to an increase in used goods.In fact, the same kind of tools had been resold on ebay, but if you cross the criminal's hand, there is a danger of infringing privacy but also financial damage, so we want to keep the equipment strict.is.

Source: Motherboard