So, now we know how to get a ordinary shell on OSX, what about root ? Luckily for us, we can do a couple of tricks with AppleScript..
You will need a Mac, and a Kali machine for this, so if you have that lined up, go read on :)

Sooo, today we're gonna poke some fun at Apple, and we're gonna do that by making af trojanized PDF file.
For this to work, you'll need some kind of payload, it could be a simple netcat, or an implant from a C2 system, I let you decide that :)
But, for this to work, you'll need a Kali system, running C2, Apache and a Mac running OSX.

So, if you've read the article on Sliver C2, and are ready for some more fun, try multiplayer mode in Sliver.
It's "real" server mode, so multiple clients can share a server instance, instead f running their own local Sliver instance. I do recommend you try the easy setup first, since there's a few caveats to running in multiplayer mode.

Also note that this config won't be dealing with setting it up on a domain, and port forwarding through the router, since in a testing scenario I don't see any use for this kind of config, it's only for a real penetration testing / external attack scenario this would be needed, and since we're dealing with a lab scenario, this won't be further discussed, but left as something for the reader to do :)

Got around to playing with half-handshake cracking today, and I'm just a bit concerned right now. Cracking wifi with tricking devices to send half-handshake info, is pretty easy.
So, i guess the advice would be, when you're not using your wifi on your phone, turn it off when you're out and about. I do know this attack requires a bit of recon and some info, but not much, so it's fast, easy and stealthy to do.

jJst a quick article on a C2 called Sliver, written by Bishop Fox. It's mostly used for Red Teaming, but it's also a pretty cool toy. So, if you're curious about what there's out there, stop by
It is just a basic article, because Sliver is quite large, so I won't cover it in total here, that's a task for you to do in your lab :)

Subcategories