It’s important to know whom you’re dealing with after hacking your target’s MacBook. Getting remote access is simple, but covertly gathering information about the user and their system can be a challenge.
Continuing with our situational awareness attacks, we’ll be further orienting ourselves within a compromised Mac device and deepening our knowledge of the target’s behavioral activities. We can accomplish this by using tools built right into macOS (previously called Mac OS X).
With these tools, we can pillage the target’s Terminal history for previously run commands, find recently modified… more