Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

🎯 🍎 Mac Hunt | TryHackMe | CTF Forensics Walkthrough | macOS Incident Response & Phishing Attack 🍎

Автор: Djalil Ayed

Загружено: 2025-06-08

Просмотров: 265

Описание:

In this deep-dive Mac Hunt CTF walkthrough, we investigate how Jake’s macOS machine was compromised by a fake recruiter’s phishing campaign—and retrace the entire attack chain using built-in macOS artifacts.

🍎🍎 Scenario 🍏🍏

Jake had gained some good knowledge and skills in the game development field. So, he decided to enter the industry through a decent job and upgrade his finances. Little did he know that there were many fake recruiters in search of people looking for jobs. These fake recruiters lure the victim through attractive jobs to achieve their objectives, often to compromise the victim's machines and use them for malicious purposes. Having conventionally overlooked cyber security, Jake fell prey to such an attack. A well-crafted phishing attack with a promising job offer compromised his Mac machine.

*In this video you’ll learn:*

✅ macOS Forensics: Artefacts, Network Information, DHCP Settings, Wireless Connections, Application Usage, DS Store, Most Recently Used
✅ macOS Forensics: Applications, Application Install History, Launch Agents and Daemons, LaunchAgents, Permissions, Safari and Downloads

🛠 Tools Used: DB Browser for SQLite, APOLLO

*Relevant Links & Resources:*
📌 Room:📌 Mac Hunt on TryHackMe – https://tryhackme.com/room/machunt
📌A deep dive into macOS TCC.db: https://www.rainforestqa.com/blog/mac...
📌Apple Pattern of Life Lazy Output'er (APOLLO): https://github.com/mac4n6/APOLLO
📌.DS_Store-parser: https://github.com/hanwenzhu/.DS_Stor...

*Timestamps:*

📋0:00 Intro & Scenario
📋06:12 What is the name of the most recently accessed folder by the user?
📋12:04 Which social platform did the attacker use to deliver the document?
📋17:03 What link did the attacker craft for the victim to download the MeetMeLive application?
📋18:51 Which network did Jake connect to after reading the instructions in the PDF?
📋21:30 What was the IP address assigned to Jake’s system?
📋22:23 When did the application get installed into the system? (YYYY-MM-DD HH:MM:SS)
📋25:24 What is the human-friendly name for the permission the user explicitly granted for the application?
📋28:45 Which feature of the OS did the attacker use to run their application at startup persistently?
📋31:32 What was the URL to which the application was exfiltrating data?

🔔 *Subscribe* for more CTF walkthroughs and incident response tutorials:    / @djalilayed  
👍 *Like* if you found this useful, and comment below your favorite forensic trick!
💡 Disclaimer: This content is for educational purposes only. Only use these techniques on systems you own or have explicit permission to test.

#CTF, #macOS #forensics #Incidentresponse #dfir #tryhackme

🎯 🍎 Mac Hunt | TryHackMe | CTF Forensics Walkthrough | macOS Incident Response & Phishing Attack 🍎

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#6353 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "IgLGiJ00a1I" ["related_video_title"]=> string(151) "Проброс портов, брутфорс wordpress и jenkins! Прохожу машину Internal на TryHackMe, уровень тяжелый!" ["posted_time"]=> string(25) "3 месяца назад" ["channelName"]=> string(14) "Mister Exploit" } [1]=> object(stdClass)#6326 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "ViL7w-fajtk" ["related_video_title"]=> string(68) "Day 192 of learning Cybersecurity until I get a job as a SOC analyst" ["posted_time"]=> string(21) "8 дней назад" ["channelName"]=> string(8) "SparkBug" } [2]=> object(stdClass)#6351 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "i-FFVM4cIXQ" ["related_video_title"]=> string(138) "База по Базам Данных - Storage (Индексы, Paging, LSM, B+-Tree, R-Tree) | Влад Тен Систем Дизайн" ["posted_time"]=> string(22) "12 дней назад" ["channelName"]=> string(15) "Влад Тен" } [3]=> object(stdClass)#6358 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "a5iQtVBYec4" ["related_video_title"]=> string(40) "TryHackMe - Basic Pentesting Walkthrough" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> string(12) "HackerSploit" } [4]=> object(stdClass)#6337 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "A92Sy9vvONM" ["related_video_title"]=> string(117) "💧🚨💧😸 BadSuccessor: Privilege Escalation in Active Directory | TryHackMe AD: BadSuccessor 😸💧🚨💧" ["posted_time"]=> string(25) "3 недели назад" ["channelName"]=> string(11) "Djalil Ayed" } [5]=> object(stdClass)#6355 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "E_70M6HeVcI" ["related_video_title"]=> string(106) "🎯🎯 Supplemental Memory | TryHackMe | Investigate lateral movement, credential theft in a memory dump" ["posted_time"]=> string(22) "11 дней назад" ["channelName"]=> string(11) "Djalil Ayed" } [6]=> object(stdClass)#6350 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "v6TqgxhUa1M" ["related_video_title"]=> string(174) "АСЛАНЯН: Обойдетесь без телефонов. «Новые» российские автомобили. Худшая реклама / МАШИНЫ" ["posted_time"]=> string(24) "18 часов назад" ["channelName"]=> string(29) "Ходорковский LIVE" } [7]=> object(stdClass)#6360 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "ati3Wsc-QoU" ["related_video_title"]=> string(174) "СЛИТЫЕ ДОКЛАДЫ ФСБ: КИТАЙ ВЕДЕТ КИБЕРВОЙНУ ПРОТИВ РОССИИ. И присматривается к Дальнему Востоку" ["posted_time"]=> string(24) "11 часов назад" ["channelName"]=> string(19) "Майкл Наки" } [8]=> object(stdClass)#6336 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "EJzitviiv2c" ["related_video_title"]=> string(29) "КАК УСТРОЕН TCP/IP?" ["posted_time"]=> string(28) "10 месяцев назад" ["channelName"]=> string(7) "Alek OS" } [9]=> object(stdClass)#6354 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "TDVnk9RhYOU" ["related_video_title"]=> string(145) "Я научу тебя пользоваться macOS за 25 минут! Мастер-класс по переходу с Windows ПК на Mac!" ["posted_time"]=> string(21) "3 года назад" ["channelName"]=> string(7) "ProTech" } }
Проброс портов, брутфорс wordpress и jenkins! Прохожу машину Internal на TryHackMe, уровень тяжелый!

Проброс портов, брутфорс wordpress и jenkins! Прохожу машину Internal на TryHackMe, уровень тяжелый!

Day 192 of learning Cybersecurity until I get a job as a SOC analyst

Day 192 of learning Cybersecurity until I get a job as a SOC analyst

База по Базам Данных - Storage (Индексы, Paging, LSM, B+-Tree, R-Tree) | Влад Тен Систем Дизайн

База по Базам Данных - Storage (Индексы, Paging, LSM, B+-Tree, R-Tree) | Влад Тен Систем Дизайн

TryHackMe - Basic Pentesting Walkthrough

TryHackMe - Basic Pentesting Walkthrough

💧🚨💧😸 BadSuccessor: Privilege Escalation in Active Directory | TryHackMe AD: BadSuccessor 😸💧🚨💧

💧🚨💧😸 BadSuccessor: Privilege Escalation in Active Directory | TryHackMe AD: BadSuccessor 😸💧🚨💧

🎯🎯 Supplemental Memory | TryHackMe | Investigate lateral movement, credential theft in a memory dump

🎯🎯 Supplemental Memory | TryHackMe | Investigate lateral movement, credential theft in a memory dump

АСЛАНЯН: Обойдетесь без телефонов. «Новые» российские автомобили. Худшая реклама / МАШИНЫ

АСЛАНЯН: Обойдетесь без телефонов. «Новые» российские автомобили. Худшая реклама / МАШИНЫ

СЛИТЫЕ ДОКЛАДЫ ФСБ: КИТАЙ ВЕДЕТ КИБЕРВОЙНУ ПРОТИВ РОССИИ. И присматривается к Дальнему Востоку

СЛИТЫЕ ДОКЛАДЫ ФСБ: КИТАЙ ВЕДЕТ КИБЕРВОЙНУ ПРОТИВ РОССИИ. И присматривается к Дальнему Востоку

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Я научу тебя пользоваться macOS за 25 минут! Мастер-класс по переходу с Windows ПК на Mac!

Я научу тебя пользоваться macOS за 25 минут! Мастер-класс по переходу с Windows ПК на Mac!

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]