Mac for Hackers: How to Get Your Mac Ready for Hacking
When it comes to hacking guides, most are written from the perspective of a Linux user. There are a few outliers, but it's mainly Linux, which leads to the idea that Linux is the only OS that's viable for hacking. This couldn't be further from the truth. A properly set up Apple machine can do quite a bit of heavy lifting.
In the days before macOS (previously called OS X), hacking on an Apple machine was laughable. Tools were sparse, the hardware was specific to Apple, and developers often didn't bother porting to Mac because of the small market share or the perception that they weren't for serious computing. In those days, Windows and Linux ruled the scene.
But things have changed—macOS is a serious contender in the hacking scene, and Macs are now up to a 7.4 and 13% market share worldwide and in the US, respectively.
Apple machines run a POSIX compliant UNIX variant, and the hardware is essentially the same as what you would find in a high-end PC. This means that most hacking tools run on the Mac operating system. It also means that an Apple machine can run Linux and Windows with ease. That's a lot of bang for your buck out of one machine! If that weren't enough, macOS is easy to use and maintain.
So for all of your forgotten about Mac-using hackers out there, my first series of how-tos is for you, and will help you overcome the first hurdle—setting up a hacking environment. Once that environment is established, pulling down tools and using them is a piece of cake.
In this series, I will be covering the following topics:
- enabling full disk encryption
- creating encrypted disk images
- managing passwords with KeePassX
- installing iTerm2, a better Terminal
- using Git with local repositories
- setting up Homebrew, a package manager
- maintaining Ruby environments with RVM
- installing Kali Linux
- installing the Metasploit Framework
- organizing your tools
Also, it'd be a good idea to learn the basics of the Vim text editor, which works the same across Linux and Mac. If you've used it before outside of the Mac operating system, you'll do just fine.
After following along with all the guides listed above, you will have a Mac configured for hacking. You will also have a grasp on why these things are vital. While the basic tools for configuring a machine for hacking may vary from platform to platform, the concepts will remain the same. This series will give you solid building blocks to work from not just on your Mac, but on all platforms!