apple id recovery key hack

Slide to turn on Recovery Key. Write down your recovery key and keep it in a safe place. It's easy to blame Williams for misplacing his recovery key (he eventually found it, thankfully, by digging through Time Machine backups), but I think Apple needs to be clearer about how its two-factor authentication works. Once you enter the Apple ID that you want to reset, click on reset password and "Continue". With a recovery key, you can regain access to your Apple ID. Never log in to your Apple account from an email or any other prompts. Execute my full exploit chain to take over Apple ID. Our next problem is that destinationDomain I pointed out before: postMessage ensures that snot-nosed kids trying to impersonate iCloud cant just impersonate iCloud by having every postMessage have a targetOrigin, basically a specified destination of the webpage. Destination unavailable. Heres what a blank page looks like, for reference: Though now we can get messages from iCloud, we cannot perform full initialisation of the login dialog without also sending them. In no possible way is our page going to be at the address https://mywebsite.com;@www.icloud.com. This allows Apple to (to some extent) reduce the blast radius of security issues that might otherwise touch iCloud. Lastly, the code is targeting a destinationDomain, which is likely set to something like https://www.icloud.com ; then, since our embedding page is not that domain, theres a failure. Messing with the embed in situ in the iCloud page with Chrome Devtools, I found that a redirect_uri of https://[email protected] would pass just fine, despite it being a really weird way of saying the same thing. When toying with redirect_uri, I found that theres a bug in the way this functionality is programmed in Apples server. Over 10 wrong attempts, iPhone will be disabled until it is connected to iTunes. Sometimes the location is wrong, as it is the location of your carrier's connection to the nearest backbone, and that can move around based on the carrier's network configuration. Execute my full exploit chain to take over Apple ID. Now, humans are absolute fiends for context-clues. Next time if you get an error message like Your Apple ID is locked for security reasons, dont panic. Email us at [email protected], Elon Musk vows to shut down bots and troll armies on Twitter today, NASA's Artemis 1 finishes voyage around the moon with splashdown off Cali, People are just realising Google has hidden a game inside your iPhone, 2020 THE SUN, US, INC. ALL RIGHTS RESERVED | TERMS OF USE | PRIVACY | YOUR AD CHOICES | SITEMAP, Make sure you're using the best security settings on your iPhone, Apple reveals NEW iPhone 13 at California launch event, How to get your deleted Instagram photos back, Here's how to see if your Gmail has been hacked. For us to be able to bypass this security control, we want the redirect_uri checker on the AppleID server to think icloud.com, and other systems to think something else. Double click on the download button and follow the instructions to free install and run this iPhone password cracker on your computer. A veteran journalist, dedicated to reporting the latest smartphone technology innovations. That appealed to me. A good example of a possible threat is when they notice attempted guesses of your security questions continuously. Sign in with your Apple ID on the next screen in order to continue. One reporter learned the hard way that Apple has a very limited recovery method if you're hacked and locked out of Apple ID For example, envConfigFromConsumer.features.footer becomes showFooter. To use Mobitrix LockAway you only need a computer, the advantages are as follows: All these features of LockAway come in handy but how do we use the tool? Follow the steps below to reset your Apple ID. Connect your iPhone or iPad to your computer. Capability based is key here, because it means that a login from Apple.com doesnt necessarily equate to one from iCloud.com, and also not all iCloud logins are necessarily the same either thats how Find My manages to skip a second-factor check to find your phone. "You can't sign in because your account was disabled for security reasons". Under your name, click Password & Security. 500 h:rPR e:f2:rRE|a:28634110 b:BE7671A8 c:req h:rPR e:wSR:SR|a:28634110 b:B74DD348 c:rRE f:Application error. Heres a cut-down version of what the Content-Security-Policy header looks like when redirect_uri is set to the default https://www.icloud.com/, Content-Security-Policy: frame-ancestors self https://www.icloud.com. Next to Account Recovery, click Manage. Let the process complete uninterrupted and thats it! A former IT admin and occasional web developer, she is also the author of LinkedIn in 30 Minutes, a Lifehacker writer, and the Mobile Office Technology expert at About.com. Next, scroll down to the bottom of the menu and tap on "Recovery Key". Good thing section 9.4.3, step 8.3 of the HTML standard says a postMessage events source is always a WindowProxy object, so it can never be null instead, right? Surely you dont want to test them one by one until you find the useful one. . If Apple is reading this, please do something about my other bug reports, it has been literally years, and also add my name to the Apple Hall of fame . Although I started this project before apple had its bug bounty program, I reported it just as the bug bounty program started and so I inadvertently made money out of it. Go to Account Recovery > Recovery Key. You should choose a strong password that will prevent hackers or others from getting access to your Apple ID. Owen Williams of The Next Web discovered that even when he had trusted devices on hand to verify his identity when his Apple ID appeared to be locked, he couldn't reset the account. Go into Password & Security and then choose Account Recovery. We need to find another security flaw between our single input, redirect_uri , through to destinationDomain, and then finally on to postMessage. You can also ask for official help to unlock your Apple ID. Eventually, stepping backward, theres this: The important part here is window.parent, which is our fake version of iCloud. By placing a breakpoint at the destinationDomain line we had before, we can see that unlike both the AppleID server and Content-Security-Policy, the whole redirect_uri parameter, https://mywebsite.com;@wwwicloud.com is being passed to postMessage, as though it were this code: At first, this seems like an absolute impasse. Content-Security-Policy: frame-ancestors self https://[email protected]. Want to find those secret features within social media apps? If someone can hijack it (by guessing or stealing your password) then they could get access to loads of private info. We need more. Sometimes, if youre careful, you can make all those little blits and bloops line up in a way that makes the dance change, and thats why Ive always loved hacking computers: all those little pieces that were never meant to be put together that way align in unintended but beautiful order. " Copyright 2022 IDG Communications, Inc. 7 inconvenient truths about the hybrid work trend. In the Account Recovery For section, find your contact's name, then click Details. Because the server is using the decodeURIComponent-ed form, and the client is using the twice decodeURIComponent-ed form, we can doubly encode special modifier characters in our URI that we want only the client to see while still passing all the server-side checks! Confirm your recovery key by entering it on the next screen. Human language is all about throwing a bunch of junk together and having it all picked up in context, but computers have a beautiful, childlike innocence toward them. Then go to Settings on your device, and choose Apple ID at the top below your name. Everything has a footprint, everything has a size, there are always side-effects. Long story short: Protect that recovery key; don't think you can rely on just one of your trusted devices to get back into your account. As the electrons wiggle, theyre expressing all these abstract ideas someone thought up sometime. {{value}} statements work like you expect, safely putting content into the page; but {{{value}}} extremely unsafely injects potentially untrusted HTML code and for most inputs looks just the same! This means when we create an embedded, sandboxed frame, as long as we dont provide the allow-same-origin flag, we create a special window that is considered to be null , and thus bypasses the pmrpc security check on received messages. It easily unlocks disabled Apple ID with a high success rate of 99%. ","iframeId":"601683d3-4d35-4edf-a33e-6d3266709de3","details":"{\"m\":\"a:28632989 b:DEA2CA08 c:req h:rPR e:wSR:SR|a:28633252 b:196F05FD c:req h:rPR e:wSR:SR|a:28633500 b:DEA2CA08 c:rRE f:Application error. Here the next step would be to verify the trusted device identity that can be any device or the SMS enabled phone number. Choose the Remove Apple ID feature and connect your iPhone to it with a lightning USB cable. Always check the address that the fake email is sent from. Open your account page (https://appleid.apple.com/) for your Apple ID and click on Forgot passcode. In the Security section, click Edit > Replace Lost Key. 500 h:rPR e:f2:rRE|a:28634621 b:BE7671A8 c:rRE f:Application error. Proof of concepts are all about demonstrating impact, and a little pop-up window isnt scary enough. Next, what about our weirder redirect_uri, https://[email protected]? You'll be asked if you're sure. Someone had an idea of how theyd dance, but thats not always true. Here you can tap Change Passcode to change the password based on your need. You can also unlock your Apple ID by resetting your Apple ID, resetting your Apple ID can be done using two methods. Lets see if an Apple engineer made a typo by searching the templates for }}}: Perfect! In this case the redirect_uri parameter is being used for a different purpose: to specify the domain that can embed the login page. You can rely on it to enter your locked iPhone with ease. Enter your Apple ID to get started. Learn more about account recovery. The Apple ID application is literally millions of lines of code, but I have better techniques in this case, if we check the Network panel in Chrome DevTools, we can see that when an error occurs, a request is sent to https://idmsa.apple.com/appleauth/jslog, assumedly to report to Apple that an error occurred. Follow the steps below to reset your Apple ID. When this happens, you can use the iTunes recovery mode to restore your device to its original condition. Or you can use your recovery key, a trusted phone number, and an Apple device to reset your password. 500 h:rPR e:f2:rRE|a:28636142 b:25A38CEC c:rRE f:Application error. Destination unavailable. Visit the iForgot website, then input your Apple ID. Now, I believe the intention here is to allow rapid testing of pmrpc-based applications: if you are making up a test message for testing, its source can be then set to null, and then you no longer need to worry about security getting in the way. To make sure that you're signed in to Apple IDs that only you control or trust, you can check the following settings on each of your devices: iPhone, iPad, or iPod touch: Settings > [your name] Settings > [your name] > iTunes & App Store Settings > Messages > Send & Receive Settings > FaceTime Mac: System Preferences > Apple ID On your computer, confirm that you wish to restore your device. But be careful: only choose a Recovery Contact that you absolutely trust. This article will show you how to unlock your Apple ID easily and quickly. Go to your Apple ID account page. We can still postMessage to the null page, so we use it to forward our messages on to Apple ID, which thinks since it is a null window, it must have generated them itself. And so, sitting again under the fronds of that tumtum tree, I found more and I promise you what I found then was as exciting as what Ill tell you about now. Here all the wonderful and admittedly very pointy and sharp benefits of the web meet the somewhat softer underbelly of the Desktop Application, the consequences of which I summarised one sunny day in Miami. Now that AppleID thinks were iCloud, we can mess around with all of those juicy settings that it gets. Tap Recovery Key. Learn on the go with our new app. Try again later. window.parent.postMessage(data_to_send, "https://mywebsite.com;@www.icloud.com"); bootData.destinationDomain = decodeURIComponent("https://mywebsite.com;@www.icloud.com"); bootData.destinationDomain = decodeURIComponent("https://mywebsite.com;\"@www.icloud.com"); https%3A%2F%2Fmywebsite.com%253F%20mywebsite.com%3B%40www.icloud.com. They'll be able to generate a Recovery Code that can be used to reset a compromised device. d()(w.a, "envConfigFromConsumer.signInLabel", "").trim() && n.attr("signInLabel", w.a.envConfigFromConsumer.signInLabel), this.attr("testIdpButtonText", d()(w.a, ", https://idmsa.apple.com/appleauth/auth/authorize/signin?frame_id=auth-ebog4xzs-os6r-58ua-4k2f-xlys83hd&language=en_US&iframeId=auth-ebog4xzs-os6r-58ua-4k2f-xlys83hd&, X-Frame-Options: ALLOW-FROM http://example.com, Let parsedURL be the result of running the, AppleIDs server takes the once-decodeURIComponent-ed form and sends, The browser parses the Content-Security-Policy directive and parses out origins, AppleIDs server generates the sign in page with the Javascript, When the AppleID client tries to send data to, The browser when performing postMessage parses an origin. But you may notice that, some of them require jailbreak and most of them cant remove the iOS password. If you visit the address, youll notice the page is just blank. Computer systems dont tend to just trust each other, especially on the web. Step1. Once we re-configure our client to send the configuration option { "privacy": "kqxyAT, HSZuyK, mXPWyI, xrUDLK, gQtYbK, MiBf, JtJ, SHo, FpXg, GKMfML, jMhPU, HTAea, pAoY, DMK, QzrFEu, ZCFyGa, BukP, IBw, byxuMf, FGOec, Kxq, NVpic, clqC, wfveM, GVDL, vVyU, jchkHd, Fke, nWnn, evNFz, drlBHY, PnvNOo, MmHDtW, anPqwD, MgJmAX, vPZhh, PRoBU, JjkRce, jdjIfX, eXqJ, PCRg, UkwJ, ylmY, tyz, ysvgCG, TvGE, SqEh, vkR, IqQtJv, TMJ, HEdJ, EMa, jju, KLb, jeae, aYFQJF, OswrUO, UGKHD, VFzA, ZSe, bHpTYW, pMt, zHnBQ, ZONgVl, IyB, iFqjmm, DMKeW, JlqXWW, qGl, Psp, nxM, ZgZz, sVUvY, EPAud, oTjkA, BtvyQx, udrV, tjW, LKfX, fSeWO, aGcaq, cDoZ, IMkW, kus, QkbPyG, wija, XvkUfQ, uGDhtG, HkPXwG, BvtPG, ClkIKp, eEBQRG, igJI, eCDu, UENyt, ojSZ, JLiVaq, xijPCS, DJL, lTf, qZWB, AQbQ, yfqu, dvdsm, rQqZ, aEcabc, vDMeVp, FDce, gccWoB, GEEa, xsIcWH, woniiD, wCJ, GhURqn,