Hacking macOS: How to Perform Situational Awareness Attacks, Part 2 (Finding Files, History & USB Devices)

It's important to know who you're dealing with after hacking your target's MacBook. Getting remote access is simple, but covertly gathering information about the user and their system can be a challenge. Continuing with our situational awareness attacks, we'll be further orienting ourselves within a compromised Mac device and deepening our knowledge of the target's behavioral activities. We can accomplish this by using tools built right into macOS (previously called Mac OS X). With these tools, we can pillage the target's Terminal history for previously run commands, find recently modified... more