Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×
Portables (Apple)

Submission + - iPhone Exploits, Metasploit Style

lol slashdot writes: Thanks to the crafty coders behind Metasploit, exploits for the iPhone are now available and readily usable, possible through the same flaw that allowed developers to unlock the iPhone.

From the article:

"This week Moore posted some payload exploits and provided detailed instructions for writing more of them. Attackers could conceivably write code to hi-jack the contacts in an iPhone address book, access the list of received and sent calls and messages, turn the phone into a listening device, track the user's location or instruct the phone to snap photos of the user's surroundings — including any companions who may be in sight of the camera lens."

Functionality to gain remote shell access to the iPhone through Metasploit was added last month.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

iPhone Exploits, Metasploit Style

Comments Filter:

The superior man understands what is right; the inferior man understands what will sell. -- Confucius

Working...