hacktricks/macos-hardening/macos-useful-commands.md
2024-02-10 18:14:16 +00:00

8.8 KiB
Raw Blame History

macOS Kullanışlı Komutlar

AWS hackleme konusunda sıfırdan kahramana dönüşmek için htARTE (HackTricks AWS Kırmızı Takım Uzmanı)'ı öğrenin!

HackTricks'i desteklemenin diğer yolları:

MacOS Otomatik Sıralama Araçları

Belirli MacOS Komutları

#System info
date
cal
uptime #show time from starting
w #list users
whoami #this user
finger username #info about user
uname -a #sysinfo
cat /proc/cpuinfo #processor
cat /proc/meminfo #memory
free #check memory
df #check disk

launchctl list #List services
atq #List "at" tasks for the user
sysctl -a #List kernel configuration
diskutil list #List connected hard drives
nettop #Monitor network usage of processes in top style

system_profiler SPSoftwareDataType #System info
system_profiler SPPrintersDataType #Printer
system_profiler SPApplicationsDataType #Installed Apps
system_profiler SPFrameworksDataType #Instaled framework
system_profiler SPDeveloperToolsDataType #Developer tools info
system_profiler SPStartupItemDataType #Startup Items
system_profiler SPNetworkDataType #Network Capabilities
system_profiler SPFirewallDataType #Firewall Status
system_profiler SPNetworkLocationDataType #Known Network
system_profiler SPBluetoothDataType #Bluetooth Info
system_profiler SPEthernetDataType #Ethernet Info
system_profiler SPUSBDataType #USB info
system_profiler SPAirPortDataType #Airport Info


#Searches
mdfind password #Show all the files that contains the word password
mfind -name password #List all the files containing the word password in the name


#Open any app
open -a <Application Name> --hide #Open app hidden
open some.doc -a TextEdit #Open a file in one application


#Computer doesn't go to sleep
caffeinate &


#Screenshot
# This will ask for permission to the user
screencapture -x /tmp/ss.jpg #Save screenshot in that file


#Get clipboard info
pbpaste


#system_profiler
system_profiler --help #This command without arguments take lot of memory and time.
system_profiler -listDataTypes
system_profiler SPSoftwareDataType SPNetworkDataType


#Network
arp -i en0 -l -a #Print the macOS device's ARP table
lsof -i -P -n | grep LISTEN
smbutil statshares -a #View smb shares mounted to the hard drive

#networksetup - set or view network options: Proxies, FW options and more
networksetup -listallnetworkservices #List network services
networksetup -listallhardwareports #Hardware ports
networksetup -getinfo Wi-Fi #Wi-Fi info
networksetup -getautoproxyurl Wi-Fi #Get proxy URL for Wifi
networksetup -getwebproxy Wi-Fi #Wifi Web proxy
networksetup -getftpproxy Wi-Fi #Wifi ftp proxy


#Brew
brew list #List installed
brew search <text> #Search package
brew info <formula>
brew install <formula>
brew uninstall <formula>
brew cleanup #Remove older versions of installed formulae.
brew cleanup <formula> #Remove older versions of specified formula.


#Make the machine talk
say hello -v diego
#spanish: diego, Jorge, Monica
#mexican: Juan, Paulina
#french: Thomas, Amelie

########### High privileges actions
sudo purge #purge RAM
#Sharing preferences
sudo launchctl load -w /System/Library/LaunchDaemons/ssh.plist (enable ssh)
sudo launchctl unload /System/Library/LaunchDaemons/ssh.plist (disable ssh)
#Start apache
sudo apachectl (start|status|restart|stop)
##Web folder: /Library/WebServer/Documents/
#Remove DNS cache
dscacheutil -flushcache
sudo killall -HUP mDNSResponder

Yüklü Yazılım ve Hizmetler

Yüklü olan şüpheli uygulamaları ve yüklü kaynaklar üzerindeki yetkileri kontrol edin:

system_profiler SPApplicationsDataType #Installed Apps
system_profiler SPFrameworksDataType #Instaled framework
lsappinfo list #Installed Apps
launchtl list #Services

Kullanıcı İşlemleri

User processes are the programs and applications that are executed by a user on a macOS system. These processes run in the context of the user's account and have limited privileges based on the user's permissions.

Kullanıcı işlemleri, bir kullanıcının macOS sistemde yürüttüğü programlar ve uygulamalardır. Bu işlemler, kullanıcının hesabı bağlamında çalışır ve kullanıcının izinlerine dayalı olarak sınırlı yetkilere sahiptir.

To view the user processes running on a macOS system, you can use the ps command with the -u option followed by the username. For example, to view the processes running under the user "john", you can use the following command:

Bir macOS sistemde çalışan kullanıcı işlemlerini görüntülemek için, kullanıcı adından sonra -u seçeneğiyle ps komutunu kullanabilirsiniz. Örneğin, "john" kullanıcısı altında çalışan işlemleri görüntülemek için aşağıdaki komutu kullanabilirsiniz:

ps -u john

This will display a list of processes running under the specified user, including their process IDs (PIDs), CPU usage, memory usage, and other information.

Bu, belirtilen kullanıcı altında çalışan işlemlerin bir listesini, işlem kimliklerini (PID'lerini), CPU kullanımını, bellek kullanımını ve diğer bilgileri içeren bir liste görüntüler.

To terminate a user process, you can use the kill command followed by the process ID (PID). For example, to terminate a process with PID 1234, you can use the following command:

Bir kullanıcı işlemini sonlandırmak için, işlem kimliğinden (PID) sonra kill komutunu kullanabilirsiniz. Örneğin, 1234 PID'ye sahip bir işlemi sonlandırmak için aşağıdaki komutu kullanabilirsiniz:

kill 1234

This will send a termination signal to the specified process, causing it to exit.

Bu, belirtilen işleme sonlandırma sinyali gönderir ve işlemin çıkmasına neden olur.

# will print all the running services under that particular user domain.
launchctl print gui/<users UID>

# will print all the running services under root
launchctl print system

# will print detailed information about the specific launch agent. And if its not running or youve mistyped, you will get some output with a non-zero exit code: Could not find service “com.company.launchagent.label” in domain for login
launchctl print gui/<user's UID>/com.company.launchagent.label

Kullanıcı oluşturma

Prompt olmadan

AWS hacklemeyi sıfırdan kahramanlık seviyesine öğrenin htARTE (HackTricks AWS Kırmızı Takım Uzmanı)!

HackTricks'i desteklemenin diğer yolları: