Header Banner
Null Byte Logo
Null Byte
Cyber Weapons LabForumMetasploit BasicsFacebook HacksPassword CrackingTop Wi-Fi AdaptersWi-Fi HackingLinux BasicsMr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker
nullbyte.png

Mac for Hackers

Laptop displaying the word "RANSOMWARE" on a red background, with a desk lamp and a dark gray wall in the background.
Oct 21, 2019

While MacOS computers have been spared from some of the most famous malware attacks, there is no shortage of malicious programs written for them. To keep your computer safe from some of the most commo ...

Screenshot of the KnockKnock application interface displaying various extensions and settings.
Oct 18, 2019

While you might suspect your MacOS computer has been infected with malware, it can be difficult to know for sure. One way to spot malicious programs is to look for suspicious behavior — like programs ...

"The Paranoid Mac Owner's Guide to Defeating Remote Snooping & Evil Maid Attacks" cover image
Jun 28, 2019

If you're worried about the security of your Mac, there are easy measures to prevent the most dangerous attacks. Named after the tactic of accessing an unattended computer in a hotel room, we can thwa ...

Old computer monitor displaying code next to a modern monitor with programming text.
Feb 22, 2019

Now that we've talked about encryption and managing your passwords, let's continue this series on getting your Mac ready for hacking by turning our attention to the terminal. The terminal is a key com ...

Pattern of beer mugs with frothy tops on a dark background.
Feb 20, 2019

After enabling disk encryption, creating encrypted disk images, installing KeePassX and iTerm2, and using Git with local repositories, the next step to getting your Mac computer ready for hacking is s ...

3D text design of the word "bit" in gold blocks on a textured background.
Jan 8, 2019

With some of the groundwork out of the way in getting a Mac set up for hacking, it's time to start looking at toolboxes. Our first toolbox is Git, which will be used throughout future tutorials. Git i ...

Code terminal output with green text on a black background.
Aug 6, 2018

MacOS isn't known as an ideal operating system for hacking without customization, but it includes native tools that allow easy control of the Wi-Fi radio for packet sniffing. Changing channels, scanni ...

Digital representation of a smartphone with data streams and binary code.
Apr 12, 2018

We're nearly done getting our Mac set up for hacking. If you haven't checked out previous tutorials, I'd recommend you do so first before diving right into this one. While macOS is a powerful POSIX-co ...

Toolbox icon with a wrench and screwdriver on a binary code background.
Nov 11, 2016

With all of the bare-bones setup out of the way in our Mac for Hackers series, your Apple machine should be ready to run a significant amount of pentesting tools. We can pull tools from GitHub and com ...

Hands typing on a keyboard with a logo in the background.
Nov 11, 2016

Metasploit is an extremely popular pentesting tool capable of enumeration, exploitation, and injecting shell code, and is a part of almost every hacking toolkit. So there's no way I could leave this o ...