You have decided to give your child that phone that you have not used for a long time but, after turning it on, here is the bitter surprise: the device is blocked by an access code that you no longer remember and, in the current state of things, you it would be impossible to put it back into operation. For this reason, you searched Google for a guide that could explain how to find out Android phone passwords and you ended up here, on my site.
How do you say? Is this exactly the case? Then know that you are lucky: you happen to be in the right place, at the right time! In fact, during this tutorial I will show you a series of procedures that will allow you to get an Android device back into operation, even if you have forgotten the access password. To deepen the discussion further, I will also provide you with an overview of the techniques used by hackers to discover the access keys of their victims, together with the most effective defense systems.
So, without waiting a moment longer, make yourself comfortable and carefully read everything I have to say on this topic: I am sure that, at the end of this reading, you will be perfectly able to reach the goal you have set for yourself. Happy reading and good luck for everything!
How to recover Android phone password
Is the Android phone you found in the drawer locked by unlock code, password or graphic pattern? Or, again, do you no longer remember the password of the Google account that you had configured within it? Then this is the section of the tutorial that suits you best, in which I will explain how to remedy the problem.
Reset unlock code
In most cases, to unlock a phone protected by the unlock code or by the graphic sequence it is necessary to perform a complete reset of the operating system , a procedure which, as you can easily guess, involves the total loss of the data and settings on the device.
Therefore, unless you have previously made a backup of the same, you may be forced to permanently give up everything in memory; if, on the other hand, your data were saved on a microSD , you can secure them by removing it from the device before even starting the unlocking phase.
Without a shadow of a doubt, the simplest way to reset the phone (eliminating any previously set unlock code) is to use Find My Device , Google’s “anti-theft” system which, among its features, allows you to restore the devices paired with a certain Gmail account, simply by using the browser and an Internet connection.
For the reset to be successful, however, it is essential that the phone is turned on , connected to the Internet and associated with a Google account whose password you remember; in addition, admin permissions must have been granted to the Google Find My Device app.
For your information, exactly as I explained to you in my guide on how to find an Android device, this operation can be done by going to the Settings> Google> Security> Find my Android device section and moving the relative lever to ON , and then grant , subsequently, the permissions to the app in question, by accessing the Settings> Security> Device administrators panel and placing the check mark next to the item Find my device .
If the phone you intend to unlock meets these requirements, you can proceed with the reset in a very simple way: connected to the Home page of Find my device , log in to the Google account configured on the phone, if necessary, then click on the icon of the device you intend to reset, using the bar located at the top.
Then, press the button > located next to the word Reset device and confirm the desire to proceed by pressing the Reset device button again , always remembering that the operation involves the complete deletion of the data in the memory and that, once started (the phone must be online), it can no longer be interrupted.
Once the reset is complete, you can proceed to the initial configuration of Android again and, if you wish, set a new unlock code (the previous security locks will have been “forgotten”); however, for security reasons, you may need to enter the password of the Google account previously configured on the device, before even proceeding.
Note : If you don’t have a computer to reset your phone, you can use a second Android smartphone (or tablet) and the free Find My Device app from Google, which works almost identical to the web service.
Google password recovery
If the phone in your possession is blocked by the Google password and, after the initial configuration phase of the operating system, you find yourself in the presence of the message ” This device has been reset, to continue, log in to an already synchronized Google account” , you must proceed with resetting your password using the wizard suggested by Android.
For your information, you can find yourself in this eventuality in at least two different cases: if you reset your phone without first disabling the Find My Device option, or if you reset your phone immediately after changing your Google password.
In both cases, it is a perfectly normal behavior, due to a security measure introduced from Android 5.1 and called FRP (or factory reset protection , protection from the factory reset ), designed to prevent the unauthorized use of device in case of theft or loss of the same.
However, you can solve the problem in at least two different ways: if your Google password has been changed recently (but you only remember the previous one), you can wait 72 hours and unlock your phone using the last passkey you remember.
If, on the other hand, you have forgotten it, you can follow the guided procedure provided by Android: if you have not already done so, connect the phone to a Wi-Fi network available nearby (it is essential to do so, for everything to be successful) , by pressing the Android Back button , until you return to the screen for choosing the wireless network to use.
Later, once again at the access screen to the Google account, enter the Gmail address in the appropriate field, tap the Next button and press the Forgot password link , located at the bottom of the next page.
At this point, follow the on-screen instructions to complete the password reset phase: the possible cases are different and vary according to the security measures provided by the account (e.g. two-factor authentication) and personal data issued during registration. Here are the most common ones.
- Last known password – when prompted, enter the last password you remember, tap the Next button and, after answering a few questions to confirm your identity, enter the new access key in the text boxes displayed on the screen.
- Recovery code – this method can be used if a phone number has been associated with your Google account. In this case, a one-time code is sent via SMS, which must be entered in the field provided to unlock the insertion of a new password.
- Backup code – if you’ve enabled two-factor authentication on your Google account and printed your backup codes, you can use one to reset your password (keep in mind that this will no longer work in the future).
- Answer to the security question – in this case, in order to reset the password, it is necessary to indicate the answer to the security question declared during registration for the service.
- Reset by “human” intervention – in the absence of other options available, you can ask Google staff to manually reset your password. In this case, it is necessary to indicate an email address or a telephone number to be traced by the Google staff, which, after verifying your identity, will provide you with the right information to reset the access key to your account. This process can take up to 4-5 business days .
However, to switch between recovery methods, you can tap the Try another method link located on the various account recovery screens.
Once the reset is complete, you should return to the Google password request screen: after entering the passkey set up above, choose whether to set the same Google account to use the phone, configure a new one or skip adding a new one. new account. For more information about the Google password recovery procedure, I invite you to carefully read the specific guide I have dedicated to the topic.
Other useful solutions
If the phone in your possession is blocked by a code or a graphic sequence and, on it, there is no Google account, or the Android Device Manager has never been activated, you can try to restore it anyway using a Recovery that is that software “external” to Android that can intervene on delicate parts of the operating system.
For example, through a Recovery it is possible to restore permissions on system files, delete folders and files otherwise locked and perform a factory data reset. Not all Recovery, however, are the same: those present “standard” on smartphones, very often, are limited; therefore they install custom ones, to have more functions at their disposal.
Having said that, accessing Recovery is simple, but the procedure may vary depending on the model of smartphone in your possession. For example, if you have a phone distributed by Samsung , you should be able to access it by pressing and holding, with the phone off, the Volume Up, Bixby and Power keys (or Volume Up, Home and Power , on terminals that have a physical Home key) .
After starting the phone in Recovery Mode, if there is TWRP Recovery (one of the most popular customized Recovery), you can try to eliminate the request for the unlock code avoiding the complete restoration of the device, as I explained to you in my guide on how to unlock wiko.
Then touch the Advanced and File Manager items , go to the Data> System path and delete all the files that begin with locksettings (e.g. locksettings.db , locksettings.db-shm , locksettings.db-wal and so on) and gatekeeper (e.g. gatekeeper.password.key, gatekeeper.pattern.key , etc.). You can delete a file by selecting it and, after touching the Delete item , by swiping from left to right, to confirm the willingness to proceed.
The disadvantage of this procedure, however, is that it cannot be applied to all smartphones, as it is not always effective. Should it be your case, again through Recovery, you can restore the device to its factory state, always remembering that the procedure involves the total loss of the data in the memory .
You ask me how to do it? It’s that simple. Once Recovery has started, choose the Wipe data / factory reset item, helping you, if necessary, with the volume keys and the Power key , press the Yes-delete all user data item and wait for the phone reset to be completed.
If your device does not have a customized Recovery, you must install it manually: first of all, you must unlock the bootloader , in order to grant the Recovery the authorization to “install” itself in the phone’s boot memory; afterwards, you must obtain root permissions on the operating system and, finally, proceed with the installation of the Recovery.
If you don’t know how to act on your own, you can Google the phrase how to install recovery [smartphone brand and model] , or, alternatively, consult the Hard reset section of my Android recovery guide.
How to find Android phone password
Wait, are you telling me that you are not on this guide as the owner of a locked phone, but would you like to know the techniques used by cybercriminals to discover Android phone passwords , in order to “defend” against such an eventuality? Then continue reading the following paragraphs of this guide, in which I will show you the dynamics behind the most used techniques and the most effective methods to defend yourself.
In spite of what one might commonly imagine, one of the most used techniques to discover the password of an Android phone (but also of many other things) does not involve the internet, nor applications, nor does it require physical possession of the phone: it is the social engineering , also called social engineering .
How? I’ll explain it to you right away. The cybercriminal on duty, exploiting the weaknesses and vulnerabilities of the designated “victim”, induces the latter to borrow the phone, with the intention of quickly installing a spy app (I’ll tell you about it shortly).
Furthermore, the most skilled and devious crackers (hackers who use their skills for malicious purposes) may be able to have their passwords revealed directly by their victims or, worse still, to trace those in use starting from information communicated too lightly. (eg your engagement / wedding anniversary, the names of your children, their respective dates of birth, and so on, all of which could be used to formulate a password that is easy to remember – but also to “guess”).
The applicable defense techniques are only two, as effective as they are obvious: avoid lending the phone to strangers or “suspicious” acquaintances and never reveal your passwords to anyone, also avoiding to release strictly personal information to people you have recently met, especially whether on social networks, chats or other places (virtual and otherwise) commonly frequented by anyone.
As easily understood by the name, spy apps are applications designed with the specific intent of monitoring what the user does (and types) on their smartphone, including the apps used, the messages sent and received, the passwords entered, the location of the device and so on.
Furthermore, some applications of this type are also able to access the camera and microphone of the device on which they are installed, as well as install other apps: if you remember well, I told you about this possibility in my guide on how to install a remote spy program. It’s creepy, I know, but such sophisticated software can do that too.
Also in this case, the best defense technique is to avoid lending your smartphone to strangers or to people of little trust (however being careful about loans to known people). Finally, if you want to check that your device does not already have applications of this type, I invite you to take all the steps that I have indicated in my guide on how to delete spy software from your mobile phone.
Very similar to spy apps (but much more limited in terms of functionality), keyloggers are software specially designed to detect everything the user types on the keyboard, sending everything, at regular intervals, to the cybercriminal who has provided to configure it.
In this way, he can have full access to anything that is typed via the telephone keypad, including any chat messages, telephone numbers or, even worse, passwords and personal codes.
The fundamental rule is, once again, do not lend your phone to strangers or untrustworthy people, as these could install an application of this type on your smartphone without you realizing it.
Lastly, but only in order of list, there is the widespread technique of phishing . Are you asking me what it consists of? Well, everything is much simpler than you might imagine: the criminal on duty, through a deceptive SMS, email or chat message (which, for example, requires you to log in to a service to avoid closing termination of the account), induces the unwitting victim to visit a given website, apparently harmless but designed for illicit purposes.
This site could be, for example, the exact reproduction of the access page to the most famous online portals (such as Amazon, eBay, Outlook and, of course, Google, just to name a few): if the victim, enticed by the message of ” alarm ”supplied, should log in to this site, would send their username and password directly to the criminal’s email box, who could use them at will.
Unfortunately, there is no “empirical” technique to predict this type of threat, but it is possible to reverse its negative effects by ignoring suspicious links received via SMS or email.
Finally, in order to avoid unpleasant surprises, it is advisable not to trust any particularly advantageous proposals (bordering on the absurd) received through chat or social networks, such as coupons for purchases of € 500 or the latest mobile phone sold for 150 €. In almost all cases, behind similar and attractive proposals, unwelcome surprises are hidden.