Submission + - iPhone Exploits, Metasploit Style
lol slashdot writes: Thanks to the crafty coders behind Metasploit, exploits for the iPhone are now available and readily usable, possible through the same flaw that allowed developers to unlock the iPhone.
From the article:
"This week Moore posted some payload exploits and provided detailed instructions for writing more of them. Attackers could conceivably write code to hi-jack the contacts in an iPhone address book, access the list of received and sent calls and messages, turn the phone into a listening device, track the user's location or instruct the phone to snap photos of the user's surroundings — including any companions who may be in sight of the camera lens."
Functionality to gain remote shell access to the iPhone through Metasploit was added last month.
From the article:
"This week Moore posted some payload exploits and provided detailed instructions for writing more of them. Attackers could conceivably write code to hi-jack the contacts in an iPhone address book, access the list of received and sent calls and messages, turn the phone into a listening device, track the user's location or instruct the phone to snap photos of the user's surroundings — including any companions who may be in sight of the camera lens."
Functionality to gain remote shell access to the iPhone through Metasploit was added last month.