We all know Android is not as secure as iOS and when iOS supporters like me patrol the web to find the best available bugs in Android, we bring you the most dangerous once.
Mobile OS community saw a great new method of unlocking back in 2008, which Google termed as Pattern Lock. Though that time it was supposed to be more secure than pincodes and fun as well, this soon became the best thing to be exploited. Hackers and developers have exploited Pattern Lock in many ways in past and still exploiting it. Interestingly one of the simplest way to get into Pattern Lock is non other than through reverse social engineering! Yes, if user’s finger have even a bit of oiliness the screen begins to smudge in the form of pattern that unlocks the device. On keen observation under light at different angles you can easily figure out the pattern. The second most common way is to try dictionary letters which people commonly use as Passwords for Pattern Lock. Most common letters used are O,V,D,U etc.
Though above methods work at times if performed by a skilled and experienced person, but still are less likely to result in any success. They are highly unpredictable and require high level of reverse engineering power and thinking out of the box. But recently I came across two technical ways developed by a developer at XDA-Developers which help you bypass Android’s Pattern Lock.
Developer claims that it was tested across gingerbread, ice cream sandwich and even on the latest jelly bean flavors of Android. And it worked fine for all.
There are two bare minimum requirement to perform this bypass:
- USB debugging should be enabled on your Android Device
- You should have ADB (Android Debug Bridge) shell on your PC
So basically there are two methods as follows
Method 1 to bypass Android Pattern lock
Key in the following commands one per line:
sqlite3 settings.db update system set value=0 where name=’lock_pattern_autolock’;
update system set value=0 where name=’lockscreen.lockedoutpermanently’;
Method 2 to hack Android Pattern lock
Method 2 can be used standalone or in conjunction to Method 1 depending upon the need. Key in the following command at ADB:
adb shell rm /data/system/gesture.key
Here’s a video on how Method 2 works:
Though any one method is sufficient, but if you are still unable to bypass the lock, this is what you can try:
- Method 1
- Method 2
P.S. – After running both the methods, you might still see Pattern Lock when the device reboots. It doesn’t mean that the exploit didn’t work, instead now your pattern lock will except any pattern and will unlock. You may see the same thing demonstrated at the end of video.P.P.S. – The developer tested this for his device and many other readers also confirmed it’s working on their devices too. But it is not guaranteed to work on all devices.
You can find the original post by developer m.sabra here. If you find these methods useful you may donate him as well.
Disclaimer: I would suggest you to use this article purely for educational purpose and do not try to steal someone's information. With the help of this article you should not try hack into someone's Android, but instead you should safeguard your own Android device and try to unlock it if you happen to forget Pattern.