Week 7 Presentation
- 10. References Cont.
• http://www.eetimes.com/document.asp?doc
_id=1279619
• https://www.icloud.com
Editor's Notes
- Can access contacts, photos, and notes from different apple products. Ipad, Iphone, Ipod touch, and Macbooks
- 128-bit encryption is the minimum, working on the same level as some financial institutions
- iBrute used a bruteforce hack to gain access. Using thousands of password combinations to gain access, with out lockouts
- Find my iphone will allow you to lock or erase the all content on the phone remotely
- Android, along with Google+ allows you to only wipe Google associated data
- Python-driven tool aimed at penetration testing around Social-Engineering. To find and protect attacks
- It is up to you, to ensure your icloud is protected