macOS Security

Date: 2022-02-09

Difficulty: Beginner

Delivered By: Bilaal Rashid

Overview

macOS is Apple's proprietary UNIX-based desktop operating system, rivalling Windows, Linux and Chrome OS, and is (arguably) the greatest operating system ever made. Despite this, there are still a few places where security could be improved. In this session, we will explore many of Apple's security mechanisms and common attack vectors for the operating system. We will then target a remote server running macOS to exploit many of these common weaknesses and earn some all important flags.

Prerequisites

The primary requirements for the session is an SSH client and, if attempting the challenge remotely, the University of Southampton's GlobalProtect VPN client. A couple of the challenges also require the Jumbo version of John the Ripper and Hashcat, although they aren't pivotal to the session and won't be too computationally intensive. Both of these come pre-installed with Kali or can be manually installed:

# Debian Linux
apt install john
apt install hashcat

# macOS
brew install john-jumbo
brew install hashcat

Challenges

The challenges will take place over SSH with a locally hosted device running macOS. Unfortunately it will only be running for the duration of the in-person session (6pm-8pm 9th Feb 2022) and so it will not be possible to attempt this session another time. You will need to be on the University's local network, so if you intend to take part outside of campus or halls then you will need to be connected to the University's VPN.

Useful Resources

Further Reading