Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0
      darty

      nmap vs macos

      Question

      Hello guys, i dont know if this is the right for make questions..  im trying to discover open ports in macos system, but is not posible.

      i tried with -sP and mac block the ping.. i tried with others options that i was looking in google and no way...

      I cant see the opens ports... someone has some idea about?

       

      thank you very much.

      Share this post


      Link to post
      Share on other sites

      2 answers to this question

      Recommended Posts

      • 0
      Staff

      maybe this will help you >>> 

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      • 0

      oh thank you, i just saw the link, but  i would like to check the macos port from other system (kali for example) in my lan.

      Im learning pentesting way.. and i tried with my macos and no way to do in the lan...

      do you know some way to do it fom linux system to a macos system in the lan?

      Thank you again and sorry for disturb you

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Learn Nmap and Advanced Scanning Techniques with Nmap. Become Ethical Hacker and Cyber Security expert with Nmap course
          What you'll learn
              Learn Ethical Hacking with NMAP
              Learn how to use Nmap
              Learn Nmap Basic and Advanced Scanning Techniques
              Learn about network scan types
              Learn about script scanning
              You will learn Nmap Discovery and Advanced Port Scanning Options
              With Nmap, you will learn to identify the operating system and running service versions of the target system
              You will learn options for bypassing firewall, IPS & IDS systems with Nmap
              What is TCP/IP model
              What is OSI model
              What is Port ? What is TCP/UDP port ?
              How to scan TCP or UDP services?
              How active servers are detected
              How to scan without getting caught in IPS & IDS systems
              How to interpret Nmap outputs
              How to scan with NSE script
          Requirements
              Minimum 8 GB RAM
              100 GB Free Harddisk space
              64-bit processor
              Microsoft Windows 7, 8, 10 or Apple Mac OS X 10.12 and later versions
              A computer for installing all the free software and tools needed to practice
              A strong work ethic, willingness to learn, and plenty of excitement about the back door of the digital world
              LIFETIME ACCESS, course updates, new content, anytime, anywhere, on any device
              Nothing else! It’s just you, your computer and your ambition to get started today
          Description
          Welcome to the "Complete NMAP: Learn Ethical Hacking with NMAP" course.
          Cyber security is one that is definitely trending with a top-notch salary to match! Ethical hackers and cyber security professionals are some of the most in-demand professionals today as the world is experiencing a major skill shortage in the field of cyber security.
          It's predicted we'll have a global shortfall of 3.5 million cyber security jobs. The average salary for Cyber Security jobs is $80,000. If you are ready to jump in cyber security career, this course is a great place for you to start.
          During this ethical hacking course, I will teach you beautiful side of the hacking.
          The Penetration test consists of 3 basic steps. These are target identification, gathering information about the target and attack.
          Information about a target can be collected in two ways.
              First; passive information collection
              Second; active information collection
          In this course, we will learn how to use, Nmap, an active information collection tool and in this case which is the second step.
          On my complete Nmap course, you`ll discover the secrets of ethical hacking and network discovery, using Nmap. You’ll learn all the details of Nmap, which is the most known and de facto network scanning tool. After downloading and installing Nmap by hands-on lessons, you will be able to use it as an IP port scanner, open port tester and checking for devices' operating systems and other features.
          No prior knowledge is needed!
          Our complete Nmap course starts at beginner levels so you don’t need to have previous knowledge of network scanning, finding vulnerabilities in devices, using Nmap.
          Free Tools
          In this course I used free tools and platforms, so you don’t need to buy any tool or application.
          In this course you will learn;
              What is the TCP/IP model and how does it work
              What is OSI model? How does it work
              What is Port? What is the TCP/UDP port
              How to scan TCP or UDP services
              How active services are detected
              How to scan without getting caught in IPS & IDS systems
              How to interpret Nmap outputs
              Nmap scripting (NSE) and more
              Zenmap
              Armitage
              Bash Scripting 101
              NMAP Bash
              NMAP Python Scripting
          By registering the course you will have lifetime access the all resources, practice videos and will be able to ask questions about related topics whenever you want.
          Why would you want to take this course?
          Our answer is simple: The quality of teaching.
          When you enroll, you will feel the OAK Academy`s seasoned developers' expertise.
          See what my fellow students have to say:
          "Very good experience, I always wanted such type of training which is filled with deep explanation and demo. I am interested in the security field and want to make my career in this domain, I really enjoy the learning." - Pragya Nidhi
          "Easy teaching, no unnecessary statements. Just telling what is needed... An effective real introduction to pentest." - Ben Dursun
          “All applied and easy to grasp the content. Looking forward to getting next training of the lecturer." - Jim Dowson
          "I liked this course! Lots of topics were covered. What I liked the most is the variety of tools used in this course. This way, someone who is willing to learn can pick up the tool that he is interested in and dive more into details. The most important thing is the experienced instructor who takes comments and reviews into consideration and gets back to you whenever there is room for improvement or new topics that might be interesting to you. I can summarise all in two words. I learned!" - Rami Zebian
          Video and Audio Production Quality
          All our videos are created/produced as high-quality video and audio to provide you the best learning experience.
          You will be,
              Seeing clearly
              Hearing clearly
              Moving through the course without distractions
          You'll also get:
              Lifetime Access to The Course
              Fast & Friendly Support in the Q&A section
              Udemy Certificate of Completion Ready for Download
          Let`s dive in now my Complete NMAP: Learn Ethical Hacking with NMAP course
          We offer full support, answering any questions.
          See you in the course!
          IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
          Who this course is for:
              Anyone who wants to learn network scan techniques by using Nmap
              Anyone who to learn script scanning in a network
              People who are willing to make a career in Cyber Security
              Cyber Security Consultants who support / will support organizations for creating a more secure environment
              Anyone who wants to be a White Hat Hacker
              Those who want to start from scratch and move forward
              People who want to take their hacking skills to the next level
              Cyber security experts
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Mystikal is a macOS payload generator integrated with Mythic. Mystikal leverages Mythic scripting to log in and creates the necessary payload for the selected initial access method. Mystikal creates an Apfell or Leviathan payload depending on the chosen initial access method.
          A common payload used for initial access is the installer package. These packages are eXtensible ARchiver (XAR) archives that conform to a specific folder structure and have a .pkg file extension. The easy comparison to Windows would be Windows installers which typically have the .msi file extension. As with Windows installers, installer packages execution typically results in an install wizard presented to the end-user for installation.
          For offensive use, typical installer package execution relies upon preinstall and postinstall scripts, which are simple bash scripts that execute during the installation process. An alternative method depends upon the abuse of JavaScript within distribution Extensible Markup Language (XML) files using InstallerJS. Apple’s InstallerJS is an Application Programming Interface (API) leveraged in distribution XML files to perform installation checks.
          Within the InstallerJS API is the system.run tag, which can execute system commands. The Silver Sparrow malware recently used this method. By abusing the distribution XML file, attackers can perform the same tasks typically within preinstall / postinstall scripts. The benefit of this method is that it makes it slightly harder to see what actions the installer package is performing. Additionally, due to the invocation time of the distribution XML file, the installer package does not need to finish the installation process for execution to occur.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Best Ethical Hacking course for hackers. Learn Advanced Scanning with Nmap, learn Hacking, become Cyber Security expert.
          What you'll learn
              Learn Ethical Hacking with NMAP
              Learn how to use Nmap
              Learn Nmap Basic and Advanced Scanning Techniques
              Learn about network scan types
              Learn about script scanning
              You will learn Nmap Discovery and Advanced Port Scanning Options
              With Nmap, you will learn to identify the operating system and running service versions of the target system
              You will learn options for bypassing firewall, IPS & IDS systems with Nmap
              What is TCP/IP model
              What is OSI model
              What is Port ? What is TCP/UDP port ?
              How to scan TCP or UDP services?
              How active servers are detected
              How to scan without getting caught in IPS & IDS systems
              How to interpret Nmap outputs
              How to scan with NSE script
              Discovering hosts with ARP ping scans
              Discovering hosts with ICMP ping scans
              NMAP Brute Force Attacks
              NMAP DNS Enumeration
              NMAP HTTP Enumeration
              NMAP MySQL Enumeration
              NMAP SMB Enumeration
              NMAP SNMP Enumeration
              HTTP Scripts-Part 1,2
              HTTP Scripts-Part 2
              Detecting SQL Injection Vulnerabilities With
              Detecting Cross Site Scripting Vulnerabilities With NMAP
              NMAP Metasploit Integration
              Zenmap
              Armitage
              Bash Scripting 101
              NMAP Bash
              NMAP Python Scripting
          Requirements
              Minimum 8 GB RAM
              100 GB Free Harddisk space
              64-bit processor
              Microsoft Windows 7, 8, 10 or Apple Mac OS X 10.12 and later versions
              A computer for installing all the free software and tools needed to practice
              A strong work ethic, willingness to learn, and plenty of excitement about the back door of the digital world
              LIFETIME ACCESS, course updates, new content, anytime, anywhere, on any device
              Nothing else! It’s just you, your computer and your ambition to get started today
          Description
          Welcome to the "Ethical Hacking: Complete NMAP For Ethical Hacking | 2021" course.
          Cyber security is one that is definitely trending with a top-notch salary to match! Ethical hackers and cyber security professionals are some of the most in-demand professionals today as the world is experiencing a major skill shortage in the field of cyber security.
          It's predicted we'll have a global shortfall of 3.5 million cyber security jobs. The average salary for Cyber Security jobs is $80,000. If you are ready to jump in cyber security career, this course is a great place for you to start.
          During this ethical hacking course, I will teach you beautiful side of the hacking.
          The Penetration Testing consists of 3 basic steps. These are target identification, gathering information about the target and attack.
          Information about a target can be collected in two ways.
              First; passive information collection
              Second; active information collection
          In this course, we will learn how to use, Nmap, an active information collection tool and in this case which is the second step.
          On my complete Nmap course, you`ll discover the secrets of ethical hacking and network discovery, using Nmap. You’ll learn all the details of Nmap, which is the most known and de facto network scanning tool. After downloading and installing Nmap by hands-on lessons, you will be able to use it as an IP port scanner, open port tester and checking for devices' operating systems and other features.
          No prior knowledge is needed!
          Our complete Nmap course starts at beginner levels so you don’t need to have previous knowledge of network scanning, finding vulnerabilities in devices, using Nmap.
          Free Tools
          In this course I used free tools and platforms, so you don’t need to buy any tool or application.
          In this course you will learn;
              What is the TCP/IP model and how does it work
              What is OSI model? How does it work
              What is Port? What is the TCP/UDP port
              How to scan TCP or UDP services
              How active services are detected
              How to scan without getting caught in IPS & IDS systems
              How to interpret Nmap outputs
              Nmap scripting (NSE) and more
              Network Hacking
              Network Security
              Discovering hosts with ARP ping scans
              Discovering hosts with ICMP ping scans
              NMAP Brute Force Attacks
              NMAP DNS Enumeration
              NMAP HTTP Enumeration
              NMAP MySQL Enumeration
              NMAP SMB Enumeration
              NMAP SNMP Enumeration
              HTTP Scripts-Part 1
              HTTP Scripts-Part 2
              Detecting SQL Injection Vulnerabilities With
              Detecting Cross Site Scripting Vulnerabilities With NMAP
              NMAP Metasploit Integration
              Zenmap
              Armitage
              Bash Scripting 101
              NMAP Bash
              NMAP Python Scripting
          By registering the course you will have lifetime access the all resources, practice videos and will be able to ask questions about related topics whenever you want.
          Why would you want to take this course?
          My answer is simple: The quality of teaching.
          See what my fellow students have to say:
          "Very good experience, I always wanted such type of training which is filled with deep explanation and demo. I am interested in the security field and want to make my career in this domain, I really enjoy the learning." - Pragya Nidhi
          "Easy teaching, no unnecessary statements. Just telling what is needed... An effective real introduction to pentest." - Ben Dursun
          “All applied and easy to grasp the content. Looking forward to getting next training of the lecturer." - Jim Dowson
          "I liked this course! Lots of topics were covered. What I liked the most is the variety of tools used in this course. This way, someone who is willing to learn can pick up the tool that he is interested in and dive more into details. The most important thing is the experienced instructor who takes comments and reviews into consideration and gets back to you whenever there is room for improvement or new topics that might be interesting to you. I can summarise all in two words. I learned!" - Rami Zebian
          It’s no secret how technology is advancing at a rapid rate. New tools are released every day, and it’s crucial to stay on top of the latest knowledge for being a better security specialist.
          Video and Audio Production Quality
          All our videos are created/produced as high-quality video and audio to provide you the best learning experience.
          You will be,
              Seeing clearly
              Hearing clearly
              Moving through the course without distractions
          You'll also get:
              Lifetime Access to The Course
              Fast & Friendly Support in the Q&A section
              Udemy Certificate of Completion Ready for Download
          Let`s dive in now my "Ethical Hacking: Complete NMAP For Ethical Hacking | 2021" course
          I offer full support, answering any questions.
          See you in the course!
          IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
          Who this course is for:
              Anyone who wants to learn network scan techniques by using Nmap
              Anyone who to learn script scanning in a network
              People who are willing to make a career in Cyber Security
              Cyber Security Consultants who support / will support organizations for creating a more secure environment
              Anyone who wants to be a White Hat Hacker
              Those who want to start from scratch and move forward
              People who want to take their hacking skills to the next level
              Cyber security experts
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Please read
          This project was made to demonstrate how easy ransomware are easy to make and how it work. The script works on Windows, Linux and MacOS. It is recommended to compile payload.py to EXE format to make it more portable.
          I do work on security awareness trainings and test the IT security and safety for other companies and you guessed it; this was made for the demo section of my presentation, NOT TO EARN MONEY OR BRICK PEOPLES COMPUTERS.
          This script does not get detected by any anti-virusses. Self made scripts go undetected 99% of the time. It's easy to write something nasty like ransomware, adware, malware, you name it. Again, this script was for research only. Not ment to be used in the open world. I am not responsible for any damage you may cause with this knowledge.
          I recommend using a VPN that allows port forwarding (For example; PIA VPN) when using this outside your network, or better, a cloud computer hosted elsewhere, like Amazon AWS.
          The conclusion of this project is that it is easy to brick a system and earn money doing it. This script doesn't use any exploits to achieve its goal, but can easily be coded into it as a nice feature.
          Features
              Generate a ransomware payload
              With or without GUI payload
              FUD (Fully Undetectable by Anti-Virus)
              Works on Windows, MacOS and Linux
              Super fast encryption with PyCrypto
              Compile to EXE, APP or Unix/Linux executable
              Custom icon for your EXE payload
              Receive keys of victims
              Decrypt files
              Demo mode (payload won't encrypt anything)
              Fullscreen mode (Warning takes over the screen)
              Custom warning message for your victim
              Custom image in your payload
              Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
              Multiple encryption methods
              Select file extentions to target
              Decide if payload should self-destruct (Console mode feature only)
              Decide wich drive to target for encryption (working directory)
              Verified server access through port forwarding VPN
              Encode payload as Morse code

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Students will learn to scan entire computer network in their organization or company
              Students will learn network scanning of ethical hacking
              Students will learn about NMAP
              Objective of network scanning
              To find live hosts,ports,ip address of live host
              To discover operating system on target host
              To discover services running on hosts
              To find vulnerabilities
              What is ping
              What is ping sweep
              Three-way handshake
              TCP communication flag
              Different type of scanning concepts
              TCP based scanning
              UDP based scanning
              Preparing lab setup at your home
              Host discovery
              Port scanning basics
              Port scanning techniques
              Port specification and scan order
              Service and version detection
              OS detection
              NMAP scripting engine
              Timing and performance
              Firewall/IDS evasion and spoofing
          Requirements
              Students must have knowledge about computer networks
              Computer network security knowledge will be advantage
          Description
          In this course you will learn about network penetration testing using NMAP. NMAP is most popular tool in ethical hacking world. This tool is widely use by Penetration Testers, Ethical Hackers, System Administrators, Network Engineers. This tool has great capability to gather information about computer networks. In this course you will learn from lab setup to complete network scanning using NMAP. In this course i will guide you step by step to setup lab and use  NMAP. This course will give you complete knowledge about network scanning. After completion of this course you will be able to find weaknesses and vulnerabilities of network. This course is complete ethical hacking based course. To be a good ethical hacker, you must have knowledge about NMAP. In this course i am using kali linux as platform to demonstrate all the lectures. This course will give you complete knowledge about full scan,half scan,three-way handshake process,FIN scan,XMAS scan,TCP scan,UDP scan,IDLE scan, Null Scan. This course will help a lot to those who are already working as IT professionals and who wants to start their career in the field of penetration testing or ethical hacking. Network scanning is a most important phase of ethical hacking. In this course you will learn complete network scanning using open source based tools.
          One of the most important feature that Nmap has ability to detect remote operating systems and software. It is very helpful during a Ethical Hacking to know about the operating system and the software used by the remote computer because you can easily predict the known vulnerabilities from this information.
          Who this course is for:
              Network Engineer
              System Administrators
              Hardware Engineer
              Computer Science Student
              Computer network known
              Hardware and network engineers
              Datacenter Engineer
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.