We were able to perform this well-known attack on the majority of devices our team had available for testing. Our fingerprint working on a MacBook Pro. With the fingerprint in hand, all we need to do is place it on the scanner. Next, we’ll print the image onto an acetate sheet with a laser printer - the toner creates a 3D structure of the fingerprint on the sheet.įor our final step, we add some wood glue on top of the print to bring to life a fake fingerprint that we can use on a scanner. The negative of the fingerprint from the previous photo. With this photo at our disposal, an hour in Photoshop yields a decent negative: A photo of a surface you’ve touched (from a table at the local library to the equipment at your nearest gym) will do.Ī photo of a victim’s fingerprint on their computer screen. To compromise your device or account, we don’t even need direct access to your fingerprint.
0 Comments
Leave a Reply. |