Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Portables (Apple)

+ - iPhone Exploits, Metasploit Style

Submitted by lol slashdot
lol slashdot (1128487) writes "Thanks to the crafty coders behind Metasploit, exploits for the iPhone are now available and readily usable, possible through the same flaw that allowed developers to unlock the iPhone.

From the article:

"This week Moore posted some payload exploits and provided detailed instructions for writing more of them. Attackers could conceivably write code to hi-jack the contacts in an iPhone address book, access the list of received and sent calls and messages, turn the phone into a listening device, track the user's location or instruct the phone to snap photos of the user's surroundings — including any companions who may be in sight of the camera lens."

Functionality to gain remote shell access to the iPhone through Metasploit was added last month."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

iPhone Exploits, Metasploit Style

Comments Filter:

What the world *really* needs is a good Automatic Bicycle Sharpener.

Working...