Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0
      darty

      nmap vs macos

      Question

      Hello guys, i dont know if this is the right for make questions..  im trying to discover open ports in macos system, but is not posible.

      i tried with -sP and mac block the ping.. i tried with others options that i was looking in google and no way...

      I cant see the opens ports... someone has some idea about?

       

      thank you very much.

      Share this post


      Link to post
      Share on other sites

      2 answers to this question

      Recommended Posts

      • 0
      Staff

      maybe this will help you >>> 

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      • 0

      oh thank you, i just saw the link, but  i would like to check the macos port from other system (kali for example) in my lan.

      Im learning pentesting way.. and i tried with my macos and no way to do in the lan...

      do you know some way to do it fom linux system to a macos system in the lan?

      Thank you again and sorry for disturb you

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Feature

          As in no ads, no time trials, no missing features. Because why not!?
          And no, it doesn’t track, monitor, or spy on you – as that’d just be pure evil!
           open-source (non-commercial)
          The full source code for LuLu is available on GitHub. Such transparency allows anybody to audit its code, or understand exactly what is going on.
           protects
          LuLu aims to alert you whenever an unauthorized network connection is attempted. As such, it can generically detect malware, or be used to block legitimate applications that may be transmitting private data to remote servers.
           simple
          “Do one thing, do it well!” LuLu is designed as simply as possible. Sure this means complex features may not be available, but it also means it’s easier to use and has a smaller attack surface!
          enterprise-friendly
          Want to know what network events are being detected? Or rules your users have added? LuLu provides simple mechanisms subscribe to such events, and stores data such as rules in an open, easily digestible manner.
          Changelog v2.4
              📂 Support for directory rules (/*) #128
              📲 New preference added to allow iOS simulator apps #379

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. nmap (“Network Mapper“) is an open-source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine to scan single hosts. nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
          The output from nmap is a list of scanned targets, with supplemental information on each depending on the options used. Key among that information is the “interesting ports table”. That table lists the port number and protocol, service name, and state. The state is either open, filtered, closed, or unfiltered.
              Open means that an application on the target machine is listening for connections/packets on that port.
              Filtered means that a firewall, filter, or other network obstacle is blocking the port so that nmap cannot tell whether it is open or closed.
              Closed ports have no application listening on them, though they could open up at any time. Ports are classified as unfiltered. when they are responsive to nmap’s probes, but nmap cannot determine whether they are open or closed. nmap reports the state combinations open|filtered and closed|filtered when it cannot determine which of the two states describe a port. The port table may also include software version details when version detection has been requested. When an IP protocol scan is requested (-sO), nmap provides information on supported IP protocols rather than listening ports.
              In addition to the interesting ports table, nmap can provide further information on targets, including reverse DNS names, operating system guesses, device types, and MAC addresses.
          Changelog Nmap 7.92:
                  [Windows] Upgraded Npcap (our Windows raw packet capturing and transmission driver) from version 1.00 to the latest version 1.50. You can read about the dozens of performance improvements, bug fixes and feature enhancements at https://npcap.org/changelog.
                  [Windows] Thanks to the Npcap 1.50 upgrade, Nmap now works on the Windows ARM architecture so you can run it on lightweight and power-efficient tablets like the Microsoft Surface Pro X and Samsung Galaxy Book Go. More ARM devices are on the way along with the upcoming Windows 11 release. See the Npcap on ARM announcement at https://seclists.org/nmap-announce/2021/2.
                  [Windows] Updated our Windows builds to Visual Studio 2019, Windows 10 SDK, and the UCRT. This prevents Nmap from working on Windows Vista and earlier, but they can still use older versions of Nmap on their ancient operating system.
                  New Nmap option –unique will prevent Nmap from scanning the same IP address twice, which can happen when different names resolve to the same address. [Daniel Miller]
                  [NSE][GH#1691] TLS 1.3 now supported by most scripts for which it is relevant, such as ssl-enum-ciphers. Some functions like ssl tunnel connections and certificate parsing will require OpenSSL 1.1.1 or later to fully support TLS 1.3. [Daniel Miller]
                  [NSE] Added 3 NSE scripts, from 4 authors, bringing the total up to 604! They are all listed at https://nmap.org/nsedoc/, and the summaries are below:
                      [GH#2201] nbns-interfaces queries NetBIOS name service (NBNS) to gather IP addresses of the target’s network interfaces [Andrey Zhukov]
                      [GH#711] openflow-info gathers preferred and supported protocol versions from OpenFlow devices [Jay Smith, Mak Kolybabi]
                      port-states prints a list of ports that were found in each state, including states that were summarized as “Not shown: X closed ports” [Daniel Miller]
                  Several changes to UDP payloads to improve accuracy:
                      [GH#2269] Fix an issue with -sU where payload data went out-of-scope before it was used, causing corrupted payloads to be sent. [Mariusz Ziulek]
                      Nmap’s retransmission limits were preventing some UDP payloads from being tried with -sU and -PU. Now, Nmap sends each payload for a particular port at the same time without delay. [Daniel Miller]
                      New UDP payloads:
                          [GH#1279] TS3INIT1 for UDP 3389 [colcrunch]
                          [GH#1895] DTLS for UDP 3391 (RD Gateway) [Arnim Rupp]
                  [NSE][GH#2208][GH#2203] SMB2 dialect handling has been redesigned. Visible changes include:
                      Notable improvement in speed of script smb-protocols and others
                      Some SMB scripts are no longer using a hardcoded dialect, improving target interoperability
                      Dialect names are aligned with Microsoft, such as 3.0.2, instead of 3.02 [nnposter]
                  [GH#2350] Upgraded OpenSSL to version 1.1.1k. This addresses some CVE’s which don’t affect Nmap in a material way. Details: https://github.com/nmap/nmap/issues/2350
                  Removed support for the ancient WinPcap library since we already include our own Npcap library (https://npcap.org) supporting the same API. WinPcap was abandoned years ago and it’s official download page says that “WE RECOMMEND USING Npcap INSTEAD” for security, stability, compatibility, and support reasons.
                  [GH#2257] Fix an issue in addrset matching that was causing all targets to be excluded if the –excludefile listed a CIDR range that contains an earlier, smaller CIDR range. [Daniel Miller]
                  Upgrade the Windows NSIS installer to use the latest NSIS 3 (version 3.07) instead of the previous NSIS 2 generation.
                  Setting –host-timeout=0 will disable the host timeout, which is set by -T5 to 15 minutes. Earlier versions of Nmap require the user to specify a very long timeout instead.
                  Improvements to Nmap’s XML output:
                      If a host times out, the XML <host> element will have the attribute timedout=”true” and the host’s timing info (srtt etc.) will still be printed.
                      The “extrareasons” element now includes a list of port numbers for each “ignored” state. The “All X ports” and “Not shown:” lines in normal output have been changed slightly to provide more detail. [Daniel Miller]
                  [NSE][GH#2237] Prevent the ssl-* NSE scripts from probing ports that were excluded from version scan, usually 9100-9107, since JetDirect will print anything sent to these ports. [Daniel Miller]
                  [GH#2206] Nmap no longer produces cryptic message “Failed to convert source address to presentation format” when unable to find useable route to the target. [nnposter]
                  [Ncat][GH#2202] Use safety-checked versions of FD_* macros to abort early if number of connections exceeds FD_SETSIZE. [Pavel Zhukov]
                  [Ncat] Connections proxied via SOCKS4/SOCKS5 were intermittently dropping server data sent right after the connection got established, such as port banners. [Sami Pönkänen]
                  [Ncat][GH#2149] Fixed a bug in proxy connect mode which would close the connection as soon as it was opened in Nmap 7.90 and 7.91.
                  [NSE][GH#2175] Fixed NSE so it will not consolidate all port script output for targets which share an IP (e.g. HTTP vhosts) under one target. [Daniel Miller]
                  [Zenmap][GH#2157] Fixed an issue where a failure to execute Nmap would result in a Zenmap crash with “TypeError: coercing to Unicode” exception.
                  Nmap no longer considers an ICMP Host Unreachable as confirmation that a target is down, in accordance with RFC 1122 which says these errors may be transient. Instead, the probe will be destroyed and other probes used to determine aliveness. [Daniel Miller]
                  [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets.
                  [Ncat][GH#2167][GH#2168] Ncat is now again generating certificates with the duration of one year. Due to a bug, recent versions of Ncat were using only one minute. [Tobias Girstmair]
                  [NSE][GH#2281] URL/percent-encoding is now using uppercase hex digits to align with RFC 3986, section 2.1, and to improve compatibility with some real-world web servers. [nnposter]
                  [NSE][GH#2174] Script hostmap-crtsh got improved in several ways. The most visible are that certificate SANs are properly split apart and that identities that are syntactically incorrect to be hostnames are now ignored. [Michel Le Bihan, nnposter]
                  [NSE] Loading of a Nikto database failed if the file was referenced relative to the Nmap directory [nnposter]
                  [GH#2199] Updated Nmap’s NPSL license to rewrite a poorly-worded clause abiyt “proprietary software companies”. The new license version 0.93 is still available from https://nmap.org/npsl/. As described on that page, we are also still offering Nmap 7.90, 7.91, and 7.92 under the previous Nmap 7.80 license. Finally, we still offer the Nmap OEM program for companies who want a non-copyleft license allowing them to redistribute Nmap with their products at https://nmap.org/oem/.
                  [NSE] Script smb2-vuln-uptime no longer reports false positives when the target does not provide its boot time. [nnposter]
                  [NSE][GH#2197] Client packets composed by the DHCP library will now contain option 51 (IP address lease time) only when requested. [nnposter]
                  [NSE][GH#2192] XML decoding in library citrixxml no longer crashes when encountering a character reference with codepoint greater than 255. (These references are now left unmodified.) [nnposter]
                  [NSE] Script mysql-audit now defaults to the bundled mysql-cis.audit for the audit rule base. [nnposter]
                  [NSE][GH#1473] It is now possible to control whether the SNMP library uses v1 (default) or v2c by setting script argument snmp.version. [nnposter]

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Mystikal
          Mystikal is a macOS payload generator integrated with Mythic. Mystikal leverages Mythic scripting to log in and creates the necessary payload for the selected initial access method. Mystikal creates an Apfell or Leviathan payload depending on the chosen initial access method.
          A common payload used for initial access is the installer package. These packages are eXtensible ARchiver (XAR) archives that conform to a specific folder structure and have a .pkg file extension. The easy comparison to Windows would be Windows installers which typically have the .msi file extension. As with Windows installers, installer packages execution typically results in an install wizard presented to the end-user for installation.
          For offensive use, typical installer package execution relies upon preinstall and postinstall scripts, which are simple bash scripts that execute during the installation process. An alternative method depends upon the abuse of JavaScript within distribution Extensible Markup Language (XML) files using InstallerJS. Apple’s InstallerJS is an Application Programming Interface (API) leveraged in distribution XML files to perform installation checks.
          Within the InstallerJS API is the system.run tag, which can execute system commands. The Silver Sparrow malware recently used this method. By abusing the distribution XML file, attackers can perform the same tasks typically within preinstall / postinstall scripts. The benefit of this method is that it makes it slightly harder to see what actions the installer package is performing. Additionally, due to the invocation time of the distribution XML file, the installer package does not need to finish the installation process for execution to occur.
          Changelog v2.2.13
              Merge pull request #107 from its-a-feature/2.2-updates
              added in a few more pages for the new ui, updated mythic-cli to include…

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Learn Nmap and Advanced Scanning Techniques with Nmap. Become Ethical Hacker and Cyber Security expert with Nmap course
          What you'll learn
              Learn Ethical Hacking with NMAP
              Learn how to use Nmap
              Learn Nmap Basic and Advanced Scanning Techniques
              Learn about network scan types
              Learn about script scanning
              You will learn Nmap Discovery and Advanced Port Scanning Options
              With Nmap, you will learn to identify the operating system and running service versions of the target system
              You will learn options for bypassing firewall, IPS & IDS systems with Nmap
              What is TCP/IP model
              What is OSI model
              What is Port ? What is TCP/UDP port ?
              How to scan TCP or UDP services?
              How active servers are detected
              How to scan without getting caught in IPS & IDS systems
              How to interpret Nmap outputs
              How to scan with NSE script
          Requirements
              Minimum 8 GB RAM
              100 GB Free Harddisk space
              64-bit processor
              Microsoft Windows 7, 8, 10 or Apple Mac OS X 10.12 and later versions
              A computer for installing all the free software and tools needed to practice
              A strong work ethic, willingness to learn, and plenty of excitement about the back door of the digital world
              LIFETIME ACCESS, course updates, new content, anytime, anywhere, on any device
              Nothing else! It’s just you, your computer and your ambition to get started today
          Description
          Welcome to the "Complete NMAP: Learn Ethical Hacking with NMAP" course.
          Cyber security is one that is definitely trending with a top-notch salary to match! Ethical hackers and cyber security professionals are some of the most in-demand professionals today as the world is experiencing a major skill shortage in the field of cyber security.
          It's predicted we'll have a global shortfall of 3.5 million cyber security jobs. The average salary for Cyber Security jobs is $80,000. If you are ready to jump in cyber security career, this course is a great place for you to start.
          During this ethical hacking course, I will teach you beautiful side of the hacking.
          The Penetration test consists of 3 basic steps. These are target identification, gathering information about the target and attack.
          Information about a target can be collected in two ways.
              First; passive information collection
              Second; active information collection
          In this course, we will learn how to use, Nmap, an active information collection tool and in this case which is the second step.
          On my complete Nmap course, you`ll discover the secrets of ethical hacking and network discovery, using Nmap. You’ll learn all the details of Nmap, which is the most known and de facto network scanning tool. After downloading and installing Nmap by hands-on lessons, you will be able to use it as an IP port scanner, open port tester and checking for devices' operating systems and other features.
          No prior knowledge is needed!
          Our complete Nmap course starts at beginner levels so you don’t need to have previous knowledge of network scanning, finding vulnerabilities in devices, using Nmap.
          Free Tools
          In this course I used free tools and platforms, so you don’t need to buy any tool or application.
          In this course you will learn;
              What is the TCP/IP model and how does it work
              What is OSI model? How does it work
              What is Port? What is the TCP/UDP port
              How to scan TCP or UDP services
              How active services are detected
              How to scan without getting caught in IPS & IDS systems
              How to interpret Nmap outputs
              Nmap scripting (NSE) and more
              Zenmap
              Armitage
              Bash Scripting 101
              NMAP Bash
              NMAP Python Scripting
          By registering the course you will have lifetime access the all resources, practice videos and will be able to ask questions about related topics whenever you want.
          Why would you want to take this course?
          Our answer is simple: The quality of teaching.
          When you enroll, you will feel the OAK Academy`s seasoned developers' expertise.
          See what my fellow students have to say:
          "Very good experience, I always wanted such type of training which is filled with deep explanation and demo. I am interested in the security field and want to make my career in this domain, I really enjoy the learning." - Pragya Nidhi
          "Easy teaching, no unnecessary statements. Just telling what is needed... An effective real introduction to pentest." - Ben Dursun
          “All applied and easy to grasp the content. Looking forward to getting next training of the lecturer." - Jim Dowson
          "I liked this course! Lots of topics were covered. What I liked the most is the variety of tools used in this course. This way, someone who is willing to learn can pick up the tool that he is interested in and dive more into details. The most important thing is the experienced instructor who takes comments and reviews into consideration and gets back to you whenever there is room for improvement or new topics that might be interesting to you. I can summarise all in two words. I learned!" - Rami Zebian
          Video and Audio Production Quality
          All our videos are created/produced as high-quality video and audio to provide you the best learning experience.
          You will be,
              Seeing clearly
              Hearing clearly
              Moving through the course without distractions
          You'll also get:
              Lifetime Access to The Course
              Fast & Friendly Support in the Q&A section
              Udemy Certificate of Completion Ready for Download
          Let`s dive in now my Complete NMAP: Learn Ethical Hacking with NMAP course
          We offer full support, answering any questions.
          See you in the course!
          IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
          Who this course is for:
              Anyone who wants to learn network scan techniques by using Nmap
              Anyone who to learn script scanning in a network
              People who are willing to make a career in Cyber Security
              Cyber Security Consultants who support / will support organizations for creating a more secure environment
              Anyone who wants to be a White Hat Hacker
              Those who want to start from scratch and move forward
              People who want to take their hacking skills to the next level
              Cyber security experts
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Mystikal is a macOS payload generator integrated with Mythic. Mystikal leverages Mythic scripting to log in and creates the necessary payload for the selected initial access method. Mystikal creates an Apfell or Leviathan payload depending on the chosen initial access method.
          A common payload used for initial access is the installer package. These packages are eXtensible ARchiver (XAR) archives that conform to a specific folder structure and have a .pkg file extension. The easy comparison to Windows would be Windows installers which typically have the .msi file extension. As with Windows installers, installer packages execution typically results in an install wizard presented to the end-user for installation.
          For offensive use, typical installer package execution relies upon preinstall and postinstall scripts, which are simple bash scripts that execute during the installation process. An alternative method depends upon the abuse of JavaScript within distribution Extensible Markup Language (XML) files using InstallerJS. Apple’s InstallerJS is an Application Programming Interface (API) leveraged in distribution XML files to perform installation checks.
          Within the InstallerJS API is the system.run tag, which can execute system commands. The Silver Sparrow malware recently used this method. By abusing the distribution XML file, attackers can perform the same tasks typically within preinstall / postinstall scripts. The benefit of this method is that it makes it slightly harder to see what actions the installer package is performing. Additionally, due to the invocation time of the distribution XML file, the installer package does not need to finish the installation process for execution to occur.

          Hidden Content
          Give reaction to this post to see the hidden content.