Forgot your password?
typodupeerror
Portables (Apple)

+ - iPhone Exploits, Metasploit Style

Submitted by lol slashdot
lol slashdot (1128487) writes "Thanks to the crafty coders behind Metasploit, exploits for the iPhone are now available and readily usable, possible through the same flaw that allowed developers to unlock the iPhone.

From the article:

"This week Moore posted some payload exploits and provided detailed instructions for writing more of them. Attackers could conceivably write code to hi-jack the contacts in an iPhone address book, access the list of received and sent calls and messages, turn the phone into a listening device, track the user's location or instruct the phone to snap photos of the user's surroundings — including any companions who may be in sight of the camera lens."

Functionality to gain remote shell access to the iPhone through Metasploit was added last month."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

iPhone Exploits, Metasploit Style

Comments Filter:

Real Programmers don't write in PL/I. PL/I is for programmers who can't decide whether to write in COBOL or FORTRAN.

Working...