Thursday, 6 February 2014

How to unlock android pattern lock without internet connection and programming

Android is most used OS in the cell phone today’s everybody use android  phones now days. this is a android is LINUX based operating system provide by Google. android phones is very easy to access there is lot of companies who sell android phones. Biggest seller of android is Samsung and HTC and many other who made android based phones. today every one wants higher configuration phones so there is lot of phones today i like s3 and Samsung note these phones are very fast and good to use but little expensive for everyone. in today there is lot of  apps for android  available for Google play store you can download free of coast of buy some apps very easily . How To Unlock an Android Pattern  droid  phones is easy to accessible and you can play everything in  this phones there is LAKH’S  of  app for android  is available in the play store there is many inbuilt apps available for most android phones .there is many ways to give security to your phones with some apps you can use inbuilt unlock pattern or  unlock codes  for easy security you can also download some  unlock codes  app from play store easily.. there is lot of games available for phones the most used app is TEMPLE RUN 2 and many other  these are free of cost apps available for everyone in the play store app in the  android  phones.  Now look  How To Unlock an Android Pattern . .


How to Unlock an Andriod Pattern?



Today many android phone user use the inbuilt unlock pattern for give security to their phones this is very easy to use but some time to take many wrong attempts it locked permanently after that you need to enter the user id you enter in the google play store to unlock phone but there is some problems to unlock again if u stop data usage in your so it cannot be connected with internet and then you cannot unlock phone without this trick. sometime user needs to go to Samsung care center and then give some money to unlock it again so this is costly you need to pay here i gonna give you a trick How To Unlock an Android Pattern  Just follow these simple steps to unlock your phone and use again free of cost.
    1.  phone want you to enter the user email id you enter in the play store.
    2.  you don’t know the email id.
    3. Then just don’t worry just follow these steps.
    4. just switch off you android phone and then wait for second to switched of it.
  1. then first click Up Volume Key and hold it.
  2. then click on home button and hold it.
  3. then press the power button and after is started just release it.
  4. and then you can see you enter in the secret android menu you never see it before.
  5. just click on home button for up and down in the menu.
  6. then just go to third option named as DELETE ALL USER DATA.
  7. then it takes done time.
  8. the phone will be started and the unlock pattern problem is fixed.

Please share and like. and let me know if you need any help in comment section

Wednesday, 5 February 2014

Crack Pattern Lock in Android With ease (New Edition)

Introduction
In this paper I’ll show you how to find an Android’s user pattern lock. I assume that the technique that I’ll demonstrate can work only on a rooted device. Actually, this article will be based on a problem given on a web-based CTF (Capture the Flag, a computer security competition).
Problem statement:
Having doubts about the loyalty of your wife, you have decided to read SMS, mail, etc., in her smartphone. Unfortunately it is locked by schema. In spite of this, you still manage to retrieve system files.
You need to find this test scheme to unlock smartphone.
You can find a link to download the full dump of system files on references sections.
Abstract
Nowadays many, if not all, smartphones offer, in addition to the traditional password lock protection, a pattern lock one, which is a mix of gestures done by the phone owner joining points on a matrix in order to unlock his phone. This “new security approach” lets you avoid any undesired taps on the device and it will be asked to authorize its access. This manipulation seems to be complicated and secure enough, which is totally wrong!

If you have a closer look at what a pattern lock actually is and how it works, you can easily conclude that it’s no more than a 3×3 matrix with some built-in conditions: The pattern drawn by the user must contain at last four points and each point can only be used once; since it’s a 3×3 matrix, the maximum of points a lock pattern can contain is nine.
Studying Pattern Scheme
The 3×3 points of the pattern lock can be represented by numbers (digits); in fact, the points are registered in order starting 0 to 8 (top left corner is 0 and ending by 8):


So the pattern used in the image above is 1 – 2 – 5 – 8 – 7 – 4.
Statistically, it’s not a very big deal having all combination between 0123 and 876543210, its not even 0.2% of all possible nine-digit numbers and we should have about 895824 pattern scheme possibilities available in an Android device.
Android devices do store pattern lock data in an unsalted SHA-1 encrypted bytes sequence format, using something similar to this code snippet in order to achieve this:
[plain]
private static byte[] patternToHash(List pattern) {
if (pattern == null) {
return null;
}
final int patternSize = pattern.size();
byte[] res = new byte[patternSize];
for (int i = 0; i < patternSize; i++) {
LockPatternView.Cell cell = pattern.get(i);
res[i] = (byte) (cell.getRow() * 3 + cell.getColumn());
}
try {
MessageDigest md = MessageDigest.getInstance("SHA-1");
byte[] hash = md.digest(res);
return hash;
} catch (NoSuchAlgorithmException nsa) {
return res;
}
}
[/plain]
This means that, for example, instead of storing directly 125874 it stores an encrypted byte array in a system file calledgesture.key located in the /data/system folder. We can read most of this information directly on “The Android Open Source Project” java files
* Generate an SHA-1 hash for the pattern. Not the most secure, but it is
* at least a second level of protection. First level is that the file
* is in a location only readable by the system process.
* @param pattern the gesture pattern.
* @return the hash of the pattern in a byte array.
According to this piece of code, our sample pattern should be saved as 6c1d006e3e146d4ee8af5981b8d84e1fe9e38b6c
The only little problem facing us now is that SHA-1 is a one-way cryptographic hash function, meaning that we cannot get the plain text from the hashed one. Due to fact that we have very finite possible pattern combinations and the other fact that Android OS does not use a salted hash, it does not take a lot to generate a dictionary containing all possible hashes of sequences from 0123 to 876543210.
Problem solving
We know enough to analyze the file system dump we’ve got; it’s not hard to find gesture.key and to explore its content:

You can open it using any text or hexadecimal editor:

The last thing to do right now is to compare the bytes of this file, 2C3422D33FB9DD9CDE87657408E48F4E635713CB, with values in the previously generated dictionary to find the hash that recovers the pattern scheme.
A previously made dictionary can be downloaded in the reference section and, using any SQLite browser, you can easily find the original pattern scheme: Select * from RainbowTable where hash = “2c3422d33fb9dd9cde87657408e48f4e635713cb”.
Which means that this is the pattern that unlocks the “wife’s device”:
Conclusion
There are no difficulties cracking or bypassing this kind of protection an Android-based device; the only real obstacle is that we cannot directly access the /data/system/ folder and gesture.key file except when we are dealing with a rooted device. This is done for fun and curiosity purpose since, if you have full access to a mobile, you can just remove or replace the file containing the SHA-1 hash with a prepared one; in addition to this, in most cases lock files are valueless from a forensic point of view.
More complicated techniques could be used if the device is not rooted. We are talking about a physical dump of the memory chip and the use of some special hardware tools like Riff-Box and an JIG-adapter, but this is not our concern for now.

Special Offer

We have our website hosted at Hostgator, the best hosting service provider we have seen so far. We have seen 0% downtime with HostGator and it just costs $3.96 a month. You can also use our coupon code "T4WMEGAOFFER" and get additional 25% discount on any hosting packages. Sign Up With Hostgator Today !