I have a Mac on my network and I would like to shellshock it to remotely gain access to it. Once I know this method is possible, I know a network with a lot of Macs on it and I would like to pentest those. What is the best way to shellshock a Macintosh on your network?
- Hot
- Active
-
Forum Thread: How to Hack Android Phone Using Same Wifi 28 Replies
13 hrs ago -
Forum Thread: How to Hack Wireless Password Through MAC Address and IP Address 25 Replies
4 days ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 50 Replies
1 wk ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 18 Replies
3 wks ago -
Forum Thread: Mitm attack problem 2 Replies
4 wks ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
1 mo ago -
Metasploit Error: Handler Failed to Bind 40 Replies
1 mo ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
1 mo ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
1 mo ago -
Forum Thread: How to Hack School Website 8 Replies
1 mo ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
1 mo ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
1 mo ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
2 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
2 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
3 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
3 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
4 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
4 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
4 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
4 mo ago
-
Hacking macOS: How to Hide Payloads Inside Photo Metadata
-
How To: Dox Anyone
-
How To: Bypass File Upload Restrictions on Web Apps to Get a Shell
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Hack Wi-Fi Networks with Bettercap
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Hack Android Using Kali (Remotely)
-
How To: Perform Advanced Man-in-the-Middle Attacks with Xerosploit
-
How To: Exploit Remote File Inclusion to Get a Shell
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Enumerate SMB with Enum4linux & Smbclient
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Automate Wi-Fi Hacking with Wifite2
-
How To: Use Hash-Identifier to Determine Hash Types for Password Cracking
-
How To: 4 Ways to Crack a Facebook Password & How to Protect Yourself from Them
1 Response
You will need to find a vulnerable version of bash and execute one of the many PoC's. In order to do this you will need to have access to bash in someway. Whether it be something on the network taking input and executing it in bash, or actual user credentials to login to one of the machines.
Share Your Thoughts