Android Forensics Tutorial 4 – Unlock Android Pattern Lock
If USB debugging is enabled, then bypassing the lock code can be done in a matter of seconds. Imagine an attacker who wants to get access to his friend’s files and applications on his Android mobile. You can first ask his handset for some false reason, to make a call, for example, and turn on the USB debugging under Settings à Developer Options à USB debugging; and then hand over the mobile back to him. So later, at some convenient time, when you get access to the device, you can exploit it using any of the following ways discussed in this article. Now adb (Android Debugging Bridge) is primarily a command line tool that communicates with the device. ADB is bundled with the Android platform tools. To explain in simple terms, this is what happens when you communicates with adb(Android Debugging Bridge):
-
An adb daemon runs as a background process on each Android device.
-
When you install Android SDK on your machine, a client is run. The client can be invoked from shell by giving an adb command.
-
A server is also run in the background to communicate between the client and adb daemon running on the Android device.
Unlock Android Pattern Lock or Pass code :
-
Connect the device to the machine where Android SDK (including platform tools etc.) is installed.
-
Open command prompt and type cd C:\android-sdk-windows\platform-tools>adb.exe devices
-
The device will be identified by the adb if everything is going fine.
-
Connect to adb shell by typing : adb.exe shell
-
The terminal appears giving you access to shell. Now type rm /data/system/gesture.key. This is the file where pattern is stored.
-
Restart the phone and you will still observe that the device is asking for the pattern. You can draw any random pattern and unlock the device.Below is the screenshot of above process :
if you like please dont forget to like and shere..
No comments:
Post a Comment