Header Banner
Null Byte Logo
Null Byte
Cyber Weapons LabForumMetasploit BasicsFacebook HacksPassword CrackingTop Wi-Fi AdaptersWi-Fi HackingLinux BasicsMr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker
nullbyte.png

Hacking macOS

Person working at a desk surrounded by multiple computer screens, wearing a hoodie with a skull design.
Jan 16, 2020

With a simple social engineering trick, sudo passwords can be captured in seconds without the target's knowledge. The passwords can then be saved to a file or exfiltrated to another computer on the ne ...

"Administrator access request on a computer screen."
Jan 3, 2020

The macOS 10.14 security update tried to make parts of the operating system difficult for hackers to access. Let's take a closer look at how its new feature works and what we can do to spoof the origi ...

Text-based image displaying computer code with "ARMOR" prominently featured in red.
Sep 27, 2019

Encrypting payloads and encoding stagers are more effective against macOS than one might think. It's very easy to evade VirusTotal and macOS antivirus software using a few simple tricks. The goal of t ...

Code execution and password entry on a computer screen.
Jul 23, 2019

KeePassX, 1Password, and LastPass are effective against keyloggers, phishing, and database breaches, but passwords managers rely on the operating system's clipboard to securely move credentials from t ...

Laptop keyboard with illuminated keys.
Jun 25, 2019

Firewall solutions for macOS aren't impervious to attacks. By taking advantage of web browser dependencies already whitelisted by the firewall, an attacker can exfiltrate data or remotely control a Ma ...

Laptop keyboard with colorful lighting effects.
Jun 14, 2019

It's important to know who you're dealing with after hacking your target's MacBook. Getting remote access is simple, but covertly gathering information about the user and their system can be a challen ...

Laptop displaying programming code on the screen.
Jun 14, 2019

The first few minutes after gaining access to a MacBook are critical — but where do we begin? Using tools built into macOS, we can develop an in-depth understanding of running background processes, de ...

Apple logo with a colorful gradient background.
Jun 9, 2019

The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like to weigh in by showing how to backdoor a MacBook in ...

Code snippet displaying a server response and file upload command.
Jun 8, 2019

Complex shell scripts can be implanted into photo metadata and later used to exploit a MacBook. In addition to obfuscating the true nature of an attack, this technique can be used to evade network fir ...

Close-up of a MacBook Pro keyboard and screen.
Jun 5, 2019

Apple's Gatekeeper security software for macOS (Mac OS X) is vulnerable to remote attacks up to version 10.14.5. An attacker that's anywhere in the world can exploit MacBooks and other Mac computers b ...