49 lines
2.4 KiB
JSON
49 lines
2.4 KiB
JSON
{
|
|
"objects": [
|
|
{
|
|
"name": "Lockscreen Bypass",
|
|
"description": "Techniques have periodically been demonstrated that exploit vulnerabilities on Android (Citation: Wired-AndroidBypass), iOS (Citation: Kaspersky-iOSBypass), or other mobile devices to bypass the device lock screen. The vulnerabilities are generally patched by the device/operating system vendor once they become aware of their existence.\n\nPlatforms: Android, iOS",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "mitre-mobile-attack",
|
|
"phase_name": "exploit-via-physical-access"
|
|
}
|
|
],
|
|
"external_references": [
|
|
{
|
|
"url": "https://attack.mitre.org/mobile/index.php/Technique/MOB-T1064",
|
|
"source_name": "mitre-mobile-attack",
|
|
"external_id": "MOB-T1064"
|
|
},
|
|
{
|
|
"description": "Andy Greenberg. (2015, September 15). Hack Brief: Emergency Number Hack Bypasses Android Lock Screens. Retrieved December 23, 2016.",
|
|
"source_name": "Wired-AndroidBypass",
|
|
"url": "https://www.wired.com/2015/09/hack-brief-new-emergency-number-hack-easily-bypasses-android-lock-screens/"
|
|
},
|
|
{
|
|
"description": "Chris Brook. (2016, November 17). iOS 10 Passcode Bypass Can Access Photos, Contacts. Retrieved December 23, 2016.",
|
|
"source_name": "Kaspersky-iOSBypass",
|
|
"url": "https://threatpost.com/ios-10-passcode-bypass-can-access-photos-contacts/122033/"
|
|
}
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
|
|
],
|
|
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
|
|
"created": "2017-10-25T14:48:24.488Z",
|
|
"x_mitre_platforms": [
|
|
"Android",
|
|
"iOS"
|
|
],
|
|
"x_mitre_tactic_type": [
|
|
"Pre-Adversary Device Access"
|
|
],
|
|
"id": "attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd",
|
|
"modified": "2018-04-13T17:05:30.756Z",
|
|
"type": "attack-pattern"
|
|
}
|
|
],
|
|
"type": "bundle",
|
|
"id": "bundle--44c40aa2-dadf-4a0a-bf74-79eaaad9161f",
|
|
"spec_version": "2.0"
|
|
} |