CN106778221A - A kind of method for cracking Android device screen-lock password - Google Patents
A kind of method for cracking Android device screen-lock password Download PDFInfo
- Publication number
- CN106778221A CN106778221A CN201611182051.6A CN201611182051A CN106778221A CN 106778221 A CN106778221 A CN 106778221A CN 201611182051 A CN201611182051 A CN 201611182051A CN 106778221 A CN106778221 A CN 106778221A
- Authority
- CN
- China
- Prior art keywords
- character string
- android device
- cracking
- device screen
- lock password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Document Processing Apparatus (AREA)
- Telephone Function (AREA)
Abstract
The present invention relates to Android Mobile solutions field, a kind of method for cracking Android device screen-lock password is disclosed, solve the problems, such as that password loss is difficult to start shooting.The present invention includes step:Cryptograph files are obtained from ciphertext storage folder;Cryptograph files are opened with editing machine, data therein are read, character string A is obtained;The exhaustive all possible numeric string bi for unlocking of system;Using with Android device in plain text encryption AES algorithm for encryption is carried out to numeric string bi, obtain character string Bi;Character string Bi is compared with character string A successively, when comparing identical, illustrates that the corresponding numeric string of the character string is unlocking pin.The present invention is applied to Android device.
Description
Technical field
The present invention relates to Android Mobile solutions field, more particularly to a kind of side for cracking Android device screen-lock password
Method.
Background technology
Android is a intelligent mobile operating system for possessing the huge market share, at present Android phone on the market
Occupation rate of market more and more higher, Android is increasingly worth paying close attention to and exploring safely.It is general safe from system safety and application
2 angles are discussed its security performance.Android system includes safely inner nuclear layer safety, framework layer safety and user authentication
3 aspects of made safe.The mobile phone of Android can all have a screen locking application miscellaneous, but the most frequently used or password solution
Lock and pattern unblock.Crack one kind that pattern unblock is exactly Android application safety.
The content of the invention
The technical problem to be solved in the present invention is:A kind of method for cracking Android device screen-lock password is provided, is solved close
Code loses the problem for being difficult to start shooting.
To solve the above problems, the technical solution adopted by the present invention is:A kind of side for cracking Android device screen-lock password
Method, comprises the following steps:
A. cryptograph files are obtained from ciphertext storage folder;
B. cryptograph files are opened with editing machine, reads data therein, obtain character string A;
C. system exhaustion is used for all possible the numeric string bi, i=1,2 ... ... for unlocking;
D. use the AES being encrypted in plain text with Android device carries out algorithm for encryption to numeric string bi, obtains
Character string Bi, i=1,2 ... ...;
E. character string Bi is compared with character string A successively, when comparing identical, illustrates the corresponding numeral of the character string
It is unlocking pin to go here and there.
Further, the cryptograph files are gesture.key files.
Further, step a obtains cryptograph files by adb pull.
Further, cryptograph files are opened with hexadecimal editing machine
Further, step d AESs are SHA1 algorithms.
The beneficial effects of the invention are as follows:The characteristics of present invention is for Android device Crypted password, takes the side of exhaustion
Formula, you can quickly crack the password of equipment, solve the problems, such as that password loss is difficult to start shooting well.
Brief description of the drawings
Fig. 1 is the encryption flow figure of Android phone;
Fig. 2 draws a design password unblock figure for certain mobile phone screen;
Fig. 3 is that gesture.key files open result figure by sixteen bit system editing machine;
Fig. 4 cracks flow chart for embodiment;
Fig. 5 is to crack the clear-text passwords figure for obtaining afterwards.
Specific embodiment
Android phone sets the flow of password as shown in figure 1, process is as follows:
Draw a design unlocking pin first.The unlock interface of Android phone is typically made up of 9 points, minimum 4 points,
Most 9 points, without repetition point;
Then encrypt in plain text.As shown in Fig. 2 this nine points are since the upper left corner, first numbering is 00, lower right corner numbering
It is 08.So diagram 2 is encoded to 000102050403060708, sixteen bit system volume then carried out to coding with SHA1 algorithms
Code is calculated ciphertext:333d9f31c209ce1217bc165c5baa7307b06bbf87.These steps are all systems itself
Complete.
Last ciphertext storage.After obtaining ciphertext, system stores in/data/system/gesture.key files ciphertext
In.We can obtain gesture.key files by adb pull orders, then be opened with hexadecimal editing machine, open
It is as shown in Figure 3 afterwards.
We are not difficult to draw coding in plain text to be aware of flow above:Each single digit numbers are zero, and even numbers bit digital is not weighed
Arrange again, and this arrangement is carried out into single SHA1 computings.Next row Brute Force can just be write into.
The principle of cracking programs is in fact and uncomplicated, after the gesture.key files for obtaining, in reading key files
Character string A, when being unlocked with cracking programs, system just contrasts the pattern of your picture, sees that corresponding numeric string is
000102050403060708 corresponding encrypted result.If it is, just unlocking;It is not to continue to keep locking.So exhaustive institute
Some numeric string arrangements, are exactly 9x8x7x6=3024 kind possibilities if doing unblock figure with 4 points, and that 5 points are just
It is 60480,7 points 362880 of point 362880,9 of point 181440,8 if 15120,6 points.Reckon in every item, also less than
985824 kinds of possibilities.Cracked using computer, it is exhaustive go out these combinations have more than is needed how long, the idiographic flow that system is cracked is such as
Shown in Fig. 4, comprise the following steps:
A. gesture.key is obtained from/data/system/ files;
B. gesture.key is opened with hexadecimal editing machine, reads data therein, obtain character string A;
C. system exhaustion is used for all possible the numeric string bi, i=1,2 ... ... for unlocking;
D. the AES being encrypted in plain text with Android device is used to carry out algorithm for encryption to numeric string bi (i.e. normal
SHA1 algorithms), obtain character string Bi, i=1,2 ... ...;
E. character string Bi is compared with character string A successively, when comparing identical, illustrates the corresponding numeral of the character string
It is unlocking pin to go here and there.Cracking programs success decryption result is as shown in Figure 5, it can be seen that obtaining password after cracking is
000102050403060708, accordingly we can extrapolate pattern unblock password shape.
If being intended merely to unlocking pin, directly gesture.key files this files is deleted just can be with this sample
Machine system does not just store the data of password.
General principle of the invention and main feature are the foregoing described, the description of specification is explanation original of the invention
Reason, without departing from the spirit and scope of the present invention, various changes and modifications of the present invention are possible, these changes and improvements
All fall within the protetion scope of the claimed invention.
Claims (5)
1. a kind of method for cracking Android device screen-lock password, it is characterised in that comprise the following steps:
A. cryptograph files are obtained from ciphertext storage folder;
B. cryptograph files are opened with editing machine, reads data therein, obtain character string A;
C. system exhaustion is used for all possible the numeric string bi, i=1,2 ... ... for unlocking;
D. use the AES being encrypted in plain text with Android device carries out algorithm for encryption to numeric string bi, obtains character
String Bi, i=1,2 ... ...;
E. character string Bi is compared with character string A successively, when comparing identical, illustrates that the corresponding numeric string of the character string is
Unlocking pin.
2. a kind of method for cracking Android device screen-lock password according to claim 1, it is characterised in that described close
File is gesture.key files.
3. a kind of method for cracking Android device screen-lock password according to claim 2, it is characterised in that step a leads to
Cross adb pull orders and obtain cryptograph files.
4. a kind of method for cracking Android device screen-lock password according to claim 3, it is characterised in that with 16
System editing machine opens cryptograph files.
5. a kind of method for cracking Android device screen-lock password according to claim 4, it is characterised in that in step d
AES be SHA1 algorithms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611182051.6A CN106778221A (en) | 2016-12-20 | 2016-12-20 | A kind of method for cracking Android device screen-lock password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611182051.6A CN106778221A (en) | 2016-12-20 | 2016-12-20 | A kind of method for cracking Android device screen-lock password |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106778221A true CN106778221A (en) | 2017-05-31 |
Family
ID=58891081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611182051.6A Pending CN106778221A (en) | 2016-12-20 | 2016-12-20 | A kind of method for cracking Android device screen-lock password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778221A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110110504A (en) * | 2019-04-30 | 2019-08-09 | 大连睿海信息科技有限公司 | Android system mobile phone application lock crack method based on Lian Fa section MTK processor communication agreement |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739856A (en) * | 2012-05-31 | 2012-10-17 | 西安电子科技大学 | Mobile phone unlocking system and method based on palm image information |
CN103984904A (en) * | 2014-05-27 | 2014-08-13 | 深圳市欧珀通信软件有限公司 | Method and device for preventing screen locking code of mobile terminal from being cracked |
-
2016
- 2016-12-20 CN CN201611182051.6A patent/CN106778221A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739856A (en) * | 2012-05-31 | 2012-10-17 | 西安电子科技大学 | Mobile phone unlocking system and method based on palm image information |
CN103984904A (en) * | 2014-05-27 | 2014-08-13 | 深圳市欧珀通信软件有限公司 | Method and device for preventing screen locking code of mobile terminal from being cracked |
Non-Patent Citations (1)
Title |
---|
孙奕: "Android安全保护机制及解密方法研究", 《信息网络安全》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110110504A (en) * | 2019-04-30 | 2019-08-09 | 大连睿海信息科技有限公司 | Android system mobile phone application lock crack method based on Lian Fa section MTK processor communication agreement |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103177223B (en) | The method and system of protected data access between stream oriented device | |
JP6046829B2 (en) | Screen unlocking method, apparatus, terminal, program, and recording medium | |
US9448949B2 (en) | Mobile data vault | |
CN106161006B (en) | Digital encryption algorithm | |
CN100520671C (en) | Finger print encryption and decryption method of electron decument | |
CN105760764A (en) | Encryption and decryption methods and devices for embedded storage device file and terminal | |
CN106407756A (en) | Unlocking method and device | |
US8880903B2 (en) | Removable drive with data encryption | |
CN106575342A (en) | Kernel program including relational data base, and method and device for executing said program | |
EP2924953B1 (en) | Method and system for encrypted data synchronization for secure data management | |
US20210099304A1 (en) | Composite identity authentication method and composite identity authentication system using same | |
CN104834840B (en) | Cipher code protection method based on mapping drift technology | |
CN101840478B (en) | Password management method | |
JP7105495B2 (en) | Segmented key authenticator | |
CN101488172A (en) | Document handwriting encryption and decryption method and its application terminal | |
CN114978525A (en) | Data security authentication method and system based on BIM | |
WO2017107530A1 (en) | Electronic password lock for spark databases and method for operating same | |
CN106778221A (en) | A kind of method for cracking Android device screen-lock password | |
CN103632070B (en) | Any handwriting graphical password method used for payment system | |
US11601291B2 (en) | Authentication method and device for matrix pattern authentication | |
CN201489536U (en) | Handwriting-based application terminal for encrypting and decrypting document | |
CN102567679A (en) | Handwriting privacy lock device and application method thereof | |
CN111815821B (en) | IC card security algorithm applied to intelligent door lock | |
TWI621029B (en) | Personal identity authentication method and system using graphic lock | |
CN104463003A (en) | File encryption protecting method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |