Android pattern cracker bash script
Tools Required to crack a gesture.key file:
Click here to scroll down to Download
1. ADB shell
2. ROOTED android device
3. Gesture Pattern SHA-1 dictionary and our script to compare those hashes
1. First of all, enable usb debugging in your mobile’s settings and connect your cell phone with your pc so that we may copy the gesture.key file for decryption purpose.
2. Download ADB
apt-get install android
dpkg –add-architecture i386
apt-get install ia32-libs
apt-get install lib32ncurses5
then, execute the following command:
adb pull /data/system/gesture.key
location of gesture.key should be in the adb folder – search it in Terminal with: find gesture.key or locate gesture.key.
3. Now download our bash script. Then execute it and follow on-screen instructions!
## Android Pattern Lock Cracker
This is a little tool to crack the pattern lock on Android devices.
## How does the pattern lock works?
Really, the pattern lock is the SHA1 hash sequence of digits (0-8) with length from 3 (4 since Android 2.3.3) to 8.
Since Android does not allows the pattern to repeat “balls” and it does not use a salt when computing the SHA1 hash, it really takes a very short period of time to crack the hash and get the pattern.
The gesture board is a 3×3 matrix, and can be repressented as follows (each digit represents a “ball”):
| 0 | | 1 | | 2 |
| 3 | | 4 | | 5 |
| 6 | | 7 | | 8 |
So if you set the pattern lock to 0 -> 1 -> 2 -> 5 -> 4, the SHA1 hash will be output of SHA1(“\x00\x01\x02\x05\x04”), and that is the hash to be cracked by this tool.
If you can’t start the script or you get “permission denied“, right click the script -> click properties -> click Permissions -> select “Allow executing file as program” or directly in the command line, type: chmod +x nameofthescript.sh
Download last version: v03042015