Skip to main content

Emergency-Number Hack Bypasses Android Lock Screens

Emergency-Number Hack Bypasses Android Lock Screens
IF YOU PROTECT your Android phone with a password rather than an unlock pattern or PIN, you may want to keep it in your sight a little more carefully than usual. A new, dead-simple attack could allow anyone who gets their hands on it to bypass that password lock with no more skill than it takes to cut and paste a long string of characters.
How to Hack : 


A security analyst at the University of Texas’s information security office in Austin has discovered that the widespread version 5 of Android is vulnerable to an easy lock-screen-bypass attack. The hack consists of basic steps like entering a long, arbitrary collection of characters into the phone’s Emergency Call dial pad and repeatedly pressing the camera shutter button. UT’s John Gordon, who outlines the full hack in this security notice and demonstrates it in the video below, says the trick offers full access to the apps and data on affected phones. And by using that access to enable developer mode, he says that an attacker could also connect to the phone via USB and install malicious software.

“My concern when I found this…was thinking about a malicious state actor or someone else with temporary access to your phone,” he says. “If, say, you give your phone to a TSA agent during extended screening, they could take something from it or plant something on it without you knowing.

Gordon says he stumbled on the lock screen vulnerability while messing with his phone during a long East Texas road trip. “I’m sitting in the passenger seat, bored, with no signal on my phone, so I start poking around and seeing what unexpected behavior I can cause,” he says. “A few idle hours of tapping every conceivable combination of elements on the screen can do wonders for finding bugs.”


How Severe is This? :

In some respects, this attack may be more of a curiosity than a critical threat. (Google itself labelled the problem as “moderate severity.”) After all, it does require physical access to the phone—rather than allowing a hacker to break into it remotely, like the text-message-based Stagefright exploit.

Even so, those with vulnerable devices should install any available security updates, consider switching from a passcode to a PIN or pattern unlock, and watch where you leave your phone. Now would be an especially bad time to forget it at the bar.

Popular posts from this blog

Android Marshmallow 32 Secret Codes!: If you are an Android User, Than you Should try these

If you have an Android phone, try these 32 secret codes! You can access various hidden menus and diagnostic, look at the state of wireless networks, by using all these codes.

Simply just open the dial page and use the code your will be able access to things which are normally hidden from sight.


1. *#06# – IMEI number
2. *#0*# – Service menu on devices like the Galaxy S III
3.  *#*#4636#*#* – Information about device, user statistics and battery
4.  *#*#34971539#*#* – Details on camera
5.  *#*#273282*255*663282*#*#* –Instant backup media files

6.  *#*#197328640#*#* – Activating test mode devices
7.  *#*#232339#*#* – Test for Wireless LAN
8.  *#*#0842#*#* – Test for vibration and backlight
9.  *#*#2664#*#* – Test for touch screen
10. *#*#1111#*#* – FTA software version (in 1234 within the same code will provide a view of the PDA and firmware version)
11. *#12580*369# – Information about the software and hardware
12. *#9090# – Diagnostic information
13. *#9900# –System dump mode
14. *#3…

Pixel Launcher APK to Download For All Android Users

Download Pixel Launcher APK to your Android device now. I am sharing the leaked APK file to all your my visitor. You can download it in free.

Google+ V8.7 APK Update by Google With New Full Screen View Option

Google has launched the latest update of The Google+ Android app with some new features. Google added new full screen viewer feature for its Google+ app. Know more about this update at below.