Tin mi Sn phm cng ngh mi Khuyn mi S kin Video Tinh T Ni quy din n Tha thun s dng dch v Gp H tr, hng dn Lin h qung co Tinh T RSS Din n in thoi My tnh Camera Xe Khoa hc cng ngh Nht To Mua bn in thoi Mua bn my tnh Mua bn my tnh bng Mua bn camera Mua bn ng h thng minh Mua bn xe Mua bn in my Mua bn sim, sim 3G Lin kt C ph Tinh t Khc tn ChiMua.vn 1Tudien NhacCuaTui 5Giay Webtretho Biker Vietnam Theo di chng ti Facebook Youtube Flickr Twitter Google Chu trch nhim ni dung: Trn Mnh Hip 2021 Cng ty C phn MXH Tinh T a ch: 209 ng Nam K Khi Ngha, Phng 7, Qun 3, TP.HCM S in thoi: 02862713156 MST: 0313255119 Giy php thit lp MXH s 11GP-BTTTT, K ngy: 08012019.But researchers from Georgia Institute of Technology have produced fake chargers theyve named Mactans that do more than just charge your phone: they install custom, malicious applications onto iPhones.The iPhone treats these computers just as it does any other computer, but instead of just charging, it responds to USB commands.
It turns out that the iPhone is very trusting of USB-attached computers; as long as the iPhone is unlocked (if only for a split second) while attached to a USB host, then the host has considerable control over the iPhone. Deploying such applications requires the creation of a provisioning profile. A provisioning profile identifies a specific phone and a specific application, allowing the named application to run on the named device. These provisioning profiles are generated by Apple and installed over USB. It then sends the UDID to Apples Web page that generates provisioning profiles. ![]() ![]() The trojaned version could then do things like take screenshots of the iPhone whenever passwords are being entered, and simulate key presses to, for example, dial numbers without user intervention. As well as requiring the phones screen to be unlocked, the generation of the provisioning profile requires the attacker to have a valid developer account. Each developer account can only generate provisioning profiles for 100 different phones, and theres no facility to remove a UDID thats associated with a developers account. In principle, a Mactans charger could be made to look identical to an official Apple charger; a suitably motivated attacker could replace proper chargers with the malicious chargers to attack targets phones. Instead of trusting any USB host that its connected to, iOS 7 will prompt users the first time, asking if they want to trust the currently connected computer. This notification will immediately disclose that a charger isnt a charger at all, but in fact a Mactans-like device. To Allow Access Please Respond On Your Iphone Registration On AnyUse of andor registration on any portion of this site constitutes acceptance of our User Agreement (updated 1120) and Privacy Policy and Cookie Statement (updated 1120) and Ars Technica Addendum (effective 8212018). Your California Privacy Rights Do Not Sell My Personal Information The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Cond Nast.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |