Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0
      darty

      nmap vs macos

      Question

      Hello guys, i dont know if this is the right for make questions..  im trying to discover open ports in macos system, but is not posible.

      i tried with -sP and mac block the ping.. i tried with others options that i was looking in google and no way...

      I cant see the opens ports... someone has some idea about?

       

      thank you very much.

      Share this post


      Link to post
      Share on other sites

      2 answers to this question

      • 0

      oh thank you, i just saw the link, but  i would like to check the macos port from other system (kali for example) in my lan.

      Im learning pentesting way.. and i tried with my macos and no way to do in the lan...

      do you know some way to do it fom linux system to a macos system in the lan?

      Thank you again and sorry for disturb you

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By 1337day-Exploits
          macOS version 18.7.0 kernel local privilege escalation exploit that may only work on Macs before 2016.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 0x1
          Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error

          Hidden Content
          Give reaction to this post to see the hidden content. Presentations
          WHAT IT IS
          It is utmost important for any security engineer to understand their network first before securing it and it becomes a daunting task to have a ‘true’ understanding of a widespread network. In a mid to large level organisation’s network having a network architecture diagram doesn’t provide the complete understanding and manual verification is a nightmare. Hence in order to secure entire network it is important to have a complete picture of all the systems which are connected to your network, irrespective of their type, function, techology etc.
          BOTTOM LINE - YOU CAN'T SECURE WHAT YOU ARE NOT AWARE OF.
          Let’s Map Your Network (LMYN) aims to provide an easy to use interface to security engineer and network administrator to have their network in graphical form with zero manual error, where a node represents a system and relationship between nodes represent the connection.
          LMYN does it in two phases:
          Learning: In this phase LMYN 'learns' the network by performing the network commands and quering the APIs and then builds graph database leveraging the responses. User can perform any of the learning activities at any point of time and LMYN will incorporate the results in existing database. Monitoring: This is a continuos process, where LMYN monitors the 'in-scope' network for any changes, compare it with existing information and update the graph database accordingly. Below technologies have been used in the tool:
          Django Python Neo4j DB Sigma JS Celery and RabbitMQ WHY IT IS
          Visualizing infrastructure network in form of graph makes it more ‘visible’ and it becomes significantly easy to perform the analysis and identify the key areas of concern for a security engineer and network administrator Also, Let’s Map Your Network formulates the graph entirely based-on either network actions performed from ‘seed’ system which will be part of the actual network or quering the APIs. Hence there is no chance of manual-error in the mapping of network WHERE TO USE IT
          Network Architecture 'Validation' Troubleshooting for network administrator Internal Network vulnerability assessment and penetration testing Source & Download

          Hidden Content
          Give reaction to this post to see the hidden content. BlackHatEurope2018 presentation slide
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 1337day-Exploits
          MacOS X versions 10.14.5 and below suffer from a Gatekeeper bypass vulnerability.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms.

          Details
          Trigmap can performs several tasks using Nmap scripting engine (NSE):
              Port Scan
              Service and Version Detection
              Web Resources Enumeration
              Vulnerability Assessment
              Common Vulnerabilities Test
              Common Exploits Test
              Dictionary Attacks Against Active Services
              Default Credentials Test

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          ToRat
          A Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients.
          Work in Progress...
          Setup

          Hidden Content
          Give reaction to this post to see the hidden content. Repository
          The important parts live in
          Client  Hidden Content
          Give reaction to this post to see the hidden content.
          Server
          Hidden Content
          Give reaction to this post to see the hidden content. TLS certificate generator
          Hidden Content
          Give reaction to this post to see the hidden content. Current Features
          the ToRAT_client communicates over TCP(with TLS) proxied through Tor with the ToRat_server (hidden service)  anonymity of client and server  end-to-end encryption Cross Platform reverse shell (Windows, Linux, Mac OS) Windows: Multiple User Account Control Bypasses (Privilege escalation) Multiple Persistence methods (User, Admin) optional transport without Tor  smaller binary  anonymity of client and server embedded Tor Unique persistent ID for every client give a client an Alias all Downloads from client get saved to ./$ID/$filename Server Shell
          Supports multiple connections Colored Output Tab-Completion of: Commands Files/ Directories in the working directory of the server Command Info select Select client to interact with list list all connected clients alias Select client to give an alias cd change the working directory of the server exit exit the server Shell after selection of a client
          Tab-Completion of: Commands Files/ Directories in the working directory of the client Command Info cd change the working directory of the client ls list the content of the working directory of the client shred delete files/ directories unrecoverable screen take a Screenshot of the client cat view Textfiles from the client alias give the client a custom alias down download a file from the client up upload a file to the client escape escape a command and run it in a native shell on the client reconnect tell the client to reconnect exit background current session an return to main shell else the command will be executed in a native shell on the client Upcoming Features
           Persistence and privilege escalation for Linux and Mac OS  Support for Android and iOS  Cat with support for .docx .pptx .od* .pdf files  File-less Persistence on Windows Hidden Content
          Give reaction to this post to see the hidden content.  ASCII-Art Welcome Message in server shell Download:

          Hidden Content
          Give reaction to this post to see the hidden content.