Perform Situational Awareness Attacks on MacOS, Part 2 [Tutorial] – 100th Episode!

June 14, 2019 by 38 Comments



How to Profile & Locate System Info on MacOS
Full Tutorial: http://bit.ly/SitAware2
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody’s Twitter: https://twitter.com/KodyKinzie

Part 1: https://www.youtube.com/watch?v=ZX3hfW6CJ2M

This is Null Byte’s 100th episode of Cyber Weapons Lab!

Establishing situational awareness is how a hacker gathers vital information about an unfamiliar machine they’ve gained access to. In our second piece on situational awareness attacks, based off Tokyoneon’s Null Byte article, we’re going to start to profile what exactly the user can do and what we can find in the system of the macOS device we have access to.

On this episode of Cyber Weapons Lab, what we’re going to be looking for is various types of files using built-in commands in macOS so that we can start digging into what is actually located on this computer we happen to have access to, such as interesting files and the bash history. To follow along, you’ll need to have the access to a MacBook or other macOS computer, and if you get confused, you can also check out the Null Byte article linked in the description. We encourage you to follow Tokyoneon on Twitter because he has a lot of great articles just like this.

Full Tutorial: http://bit.ly/SitAware2
Tokyoneon on Twitter: https://twitter.com/tokyoneon_

Follow Null Byte on:
Twitter: https://twitter.com/nullbytewht
Flipboard: https://flip.it/3.Gf_0
Weekly newsletter: https://eepurl.com/dE3Ovb

source

38 Replies to “Perform Situational Awareness Attacks on MacOS, Part 2 [Tutorial] – 100th Episode!”

  1. Lulz Face says:

    100th Episode! Gratz.

  2. My friends 🙋‍♂️

  3. Nasoj says:

    Hey guys, do you know any Dead Man's switch services?

  4. Congratulations on making 100 videos and teaching things so easily

  5. cera cera says:

    Awesome like always

  6. Absolutely amazing and interesting but I suggest u do a colab with hackersploit hes a true legend

  7. Congratulations!
    The 100th Episode!

  8. Hey Null Byte/Kody, I love your videos they are so professional and informative plus entertaining. I have a question, why do a lot of tools/applications need to be ran on a linux system? An example of this is H8 Mail, in the video you say that you either need the OS Ubuntu or Linux. *Why are so many tools built only for linux and not possible/or not easily ran on windows?*(another example, Wifi Phisher SE attack + many more). The answer to this question might even make for an interesting video! Congratulations on 100 episodes!!! 🙂

  9. Congratulations for the channel and for the cat 😸

  10. Sad Kris says:

    You should try making some videos on Windows 10 computers since you've covered most others

  11. m.nageh says:

    Mate the dns-rebinding attack plsss… why you are ignoring me ?

  12. kin bradley says:

    best of best Mr. Null byte

  13. PC Wizrd says:

    Great tutorials, enjoying the videos. How do you track all the findings of research? Is there a recommended method or just use text files to track and develop your full picture of the targets?

  14. Dhruv 4715 says:

    This is your 100th episode and when i clicked on like button likes were increased to 100

  15. Rory Wall says:

    happy 100th episode.
    Thanks to this I know so much more about ethical hacking
    Thank you so so so much!

  16. Nerzhina says:

    Hi Kody. Learning so much about ethical hacking from your videos. Best wishes to U & your team. Plz keep up the great work.

  17. Amonrah 178 says:

    Thank You Kody. I love your work. Beautiful cat.

  18. JohanFer says:

    What's up with the cat? Somehow you look evil with it lol. Congratulations on your 100th episode. Ive learnt of many ways to protect my network and equipment and computers as a whole.

  19. Hanson Yang says:

    You are the best!!! 100th Episode! Congrats dude

  20. Let's party 100th episode that's right big shout out all you Reading this can I get a 100 likes have a great day

  21. Which laptop computer best for hacking and….

  22. Can you make a video about how to brute force with medusa .

  23. David PC says:

    Congrats on 100,really enjoy your channel!

  24. Jocky Rock says:

    Sir How to Hack WPA2 kali linux

  25. Paul says:

    Find with exec cat was something I used for a while to search for strings recursively, but now cd to root and egrep -r "that old string".

  26. Gadget 420 says:

    Does anybody know how to unlock bootloader of Huawei P8 lite on Ubuntu

  27. BRO PLEASE MAKE VIDEO OF KALI LINUX BASIC COMMANDS …. PLEASE BRO

  28. SA601154 says:

    Congratulations on the 100th Episode!

  29. Card ZZZ says:

    I LOVE THESE MAC TUTORIALS!!!!

  30. Hello, I would like to know what Linux computer do you have? A link could be amazing, and if you have a couple of Linux computers, I'd appreciate it if you told me which one is the best for most of your tutorials! thanks.

  31. teaches how to hack web can

  32. Hades Tech says:

    Happy One Hundred Episodes. Always Great Content. Please keep up the outstanding work!

Leave a Comment

Your email address will not be published. Required fields are marked *