![]() ![]() ![]() Apple's iOS, for instance, makes the user wait increasing lengths of time after each incorrect PIN guess. Not all PIN-protected devices are susceptible to the R2B2's brute force attack, Engler admits. That bot, which they're calling the Capacitative Cartesian Coordinate Brute-force Overlay or C3BO, remains a work in progress, Engler says, though he plans to have it ready for Def Con. In addition to their finger-like R2B2, Engler and Vines are also working on another version of their invention that will instead use electrodes attached to a phone's touchscreen, simulating capacitative screen taps with faster electrical signals. The researchers plan to release both the free software and the blueprints for their 3D-printable parts at the time of their Def Con talk. The device can be controlled via USB, connecting to a Mac or Windows PC that runs a simple code-cracking program. Engler and Vines built their bot, shown briefly in the video above, from three $10 servomotors, a plastic stylus, an open-source Arduino microcontroller, a collection of plastic parts 3D-printed on their local hackerspace's Makerbot 3D printer, and a five dollar webcam that watches the phone's screen to detect if it's successfully guessed the password. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |