githubEdit

macOS

Skill Level: Intermediate to Advanced Prerequisites: Unix basics, macOS architecture

Initial Reconnaissance

System Information

# System info
sw_vers
system_profiler SPSoftwareDataType
uname -a
sysctl -a | grep -E "kern.version|hw.model"

# Hardware info
system_profiler SPHardwareDataType
ioreg -l | grep -i "product-name"

# Disk info
diskutil list
df -h

# Network info
ifconfig
netstat -rn
networksetup -listallhardwareports

# Current user
whoami
id
groups

# Logged in users
who
w
last

# Running processes
ps aux
launchctl list

Security Configuration

Credential Harvesting

Keychain Access

Browser Credentials

SSH Keys

Environment Variables

Privilege Escalation

Sudo Exploitation

SUID Binaries

Launch Agent/Daemon Hijacking

Dylib Hijacking

TCC Bypass

Persistence

Login Items

Cron Jobs

Periodic Scripts

Login/Logout Hooks

Folder Actions

Application Bundles

Lateral Movement

Remote Apple Events

ARD (Apple Remote Desktop)

SSH

Evasion

Disable Security Features

Hide from Activity Monitor

Log Evasion

Tools

Checklist

Last updated

Was this helpful?