Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0
      darty

      nmap vs macos

      Question

      Hello guys, i dont know if this is the right for make questions..  im trying to discover open ports in macos system, but is not posible.

      i tried with -sP and mac block the ping.. i tried with others options that i was looking in google and no way...

      I cant see the opens ports... someone has some idea about?

       

      thank you very much.

      Share this post


      Link to post
      Share on other sites

      2 answers to this question

      Recommended Posts

      • 0
      Staff

      maybe this will help you >>> 

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      • 0

      oh thank you, i just saw the link, but  i would like to check the macos port from other system (kali for example) in my lan.

      Im learning pentesting way.. and i tried with my macos and no way to do in the lan...

      do you know some way to do it fom linux system to a macos system in the lan?

      Thank you again and sorry for disturb you

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Students will learn to scan entire computer network in their organization or company
              Students will learn network scanning of ethical hacking
              Students will learn about NMAP
              Objective of network scanning
              To find live hosts,ports,ip address of live host
              To discover operating system on target host
              To discover services running on hosts
              To find vulnerabilities
              What is ping
              What is ping sweep
              Three-way handshake
              TCP communication flag
              Different type of scanning concepts
              TCP based scanning
              UDP based scanning
              Preparing lab setup at your home
              Host discovery
              Port scanning basics
              Port scanning techniques
              Port specification and scan order
              Service and version detection
              OS detection
              NMAP scripting engine
              Timing and performance
              Firewall/IDS evasion and spoofing
          Requirements
              Students must have knowledge about computer networks
              Computer network security knowledge will be advantage
          Description
          In this course you will learn about network penetration testing using NMAP. NMAP is most popular tool in ethical hacking world. This tool is widely use by Penetration Testers, Ethical Hackers, System Administrators, Network Engineers. This tool has great capability to gather information about computer networks. In this course you will learn from lab setup to complete network scanning using NMAP. In this course i will guide you step by step to setup lab and use  NMAP. This course will give you complete knowledge about network scanning. After completion of this course you will be able to find weaknesses and vulnerabilities of network. This course is complete ethical hacking based course. To be a good ethical hacker, you must have knowledge about NMAP. In this course i am using kali linux as platform to demonstrate all the lectures. This course will give you complete knowledge about full scan,half scan,three-way handshake process,FIN scan,XMAS scan,TCP scan,UDP scan,IDLE scan, Null Scan. This course will help a lot to those who are already working as IT professionals and who wants to start their career in the field of penetration testing or ethical hacking. Network scanning is a most important phase of ethical hacking. In this course you will learn complete network scanning using open source based tools.
          One of the most important feature that Nmap has ability to detect remote operating systems and software. It is very helpful during a Ethical Hacking to know about the operating system and the software used by the remote computer because you can easily predict the known vulnerabilities from this information.
          Who this course is for:
              Network Engineer
              System Administrators
              Hardware Engineer
              Computer Science Student
              Computer network known
              Hardware and network engineers
              Datacenter Engineer
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Scantron
          Scantron is a distributed nmap scanner comprised of two components. The first is a master node that consists of a web front end used for scheduling scans and storing nmap scan targets and results. The second component is an agent that pulls scan jobs from the master and conducts the actual nmap scanning. A majority of the application’s logic is purposely placed on the master to make the agent(s) as “dumb” as possible. All nmap target files and nmap results reside on master and are shared through a network file share (NFS) leveraging SSH tunnels. The agents call back to master periodically using a REST API to check for scan tasks and provide scan status updates.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. BruteSpray takes nmap GNMAP/XML output and automatically brute-forces services with default credentials using Medusa. It can even find non-standard ports by using the -sV inside Nmap.
          Supported Services
              ssh
              ftp
              telnet
              vnc
              mssql
              mysql
              postgresql
              rsh
              imap
              nntp
              pcanywhere
              pop3
              rexec
              rlogin
              smbnt
              smtp
              svn
              vmauthd
          Changelog v1.6.7
              added local check for wordlists

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 1337day-Exploits
          macOS version 18.7.0 kernel local privilege escalation exploit that may only work on Macs before 2016.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 0x1
          Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error

          Hidden Content
          Give reaction to this post to see the hidden content. Presentations
          WHAT IT IS
          It is utmost important for any security engineer to understand their network first before securing it and it becomes a daunting task to have a ‘true’ understanding of a widespread network. In a mid to large level organisation’s network having a network architecture diagram doesn’t provide the complete understanding and manual verification is a nightmare. Hence in order to secure entire network it is important to have a complete picture of all the systems which are connected to your network, irrespective of their type, function, techology etc.
          BOTTOM LINE - YOU CAN'T SECURE WHAT YOU ARE NOT AWARE OF.
          Let’s Map Your Network (LMYN) aims to provide an easy to use interface to security engineer and network administrator to have their network in graphical form with zero manual error, where a node represents a system and relationship between nodes represent the connection.
          LMYN does it in two phases:
          Learning: In this phase LMYN 'learns' the network by performing the network commands and quering the APIs and then builds graph database leveraging the responses. User can perform any of the learning activities at any point of time and LMYN will incorporate the results in existing database. Monitoring: This is a continuos process, where LMYN monitors the 'in-scope' network for any changes, compare it with existing information and update the graph database accordingly. Below technologies have been used in the tool:
          Django Python Neo4j DB Sigma JS Celery and RabbitMQ WHY IT IS
          Visualizing infrastructure network in form of graph makes it more ‘visible’ and it becomes significantly easy to perform the analysis and identify the key areas of concern for a security engineer and network administrator Also, Let’s Map Your Network formulates the graph entirely based-on either network actions performed from ‘seed’ system which will be part of the actual network or quering the APIs. Hence there is no chance of manual-error in the mapping of network WHERE TO USE IT
          Network Architecture 'Validation' Troubleshooting for network administrator Internal Network vulnerability assessment and penetration testing Source & Download

          Hidden Content
          Give reaction to this post to see the hidden content. BlackHatEurope2018 presentation slide
          Hidden Content
          Give reaction to this post to see the hidden content.