Trending Tutorials

Hacking a Mac in 20 seconds or less, Hak5 1521.2

Try FreshBooks for free:

Shannon Morse shows us how to root her mac in under 10 seconds with a USB Rubber Ducky and a simple script from article.

20 Comments on Hacking a Mac in 20 seconds or less, Hak5 1521.2

  1. Hypothetically, how far away could the listening computer be from the computer being attacked?

  2. Anything for windows ? :)

  3. Actually, there's an easy way to re-own a Mac.. as someone mentioned below, there is booting into single user mode, doing a quick chkdsk (can't remember the Mac function off the top of my head), but in one of the folders, there is a single, zero-size file, that if you delete it, then reboot, will treat the install as if you just fresh installed, and you are not the Root owner. Mind you, IF you're talking a XServe, there is also a file, which has the install key. Someone junked a Xserve near me. It only had one bad drive, but I was able to replace it, and re-own the Server. Why people throw out their good working equipment, for the latest/greatest when it still works, is beyond me… I've re-purposed a bunch of junked PC's as Linux servers, desktops, and gaming machines. Even been able to unlock several Windows machines using tools found on the net. Other times, I've found perfectly good equipment deliberately destroyed! WHY?!?!?! Why destroy perfectly good equipment? That's nothing but Wasteful, in the name of security.. Simply secure-wipe the drive if you're so paranoid of security. Re-install the OS, and give it to someone else to use!

  4. God this is so poorly written

  5. Wich PC she use?

  6. I like programming. It is not that hard. I want to learn how to code.

  7. Damn it! I just lost the game. :(

  8. Something to think about is utilizing your PFsense box. Use the same method but when sshiing to your pfsense box select Root as your username, then once on the console select Shell (8) and input ( nc -l 1337) match your port and you are done. 

    I had a friend ask me about this and here is your answer. I posted it here so all of you can use this for your own purposes. I use it for security purposes. If Someone were to steal my computer I can take a snapshot using "screencapture -T 10 timed.jpg" making sure I have navigated to the .hidden folder and later extract the image and other information to give to the authorities. To take images from the isight use imagesnap you can manually install it from the terminal or simply install it before hand int he "usr/local/bin" folder and use
    while :; do imagesnap ~/Desktop/$(date +%y%m%d%H%M%S).png
    sleep ${1-1}

    Dont know your serial of your computer? 
    Here it is "ioreg -l | awk '/IOPlatformSerialNumber/ { print $4;}'" remove quotes and run this on the terminal. You will have all information and say goodbye to the thief. Install other apps like keystroke apps and others to get more information from the person. Always ensure to leave your guest account open or they will attempt to wipe the system.

  9. +Hak5 
    Shannon Morse:with a USB rubber Duckey.
    Me:Or a phone running Kail linux nethunter. Yep you can do that now.

  10. 2 words… firmware password. Still like the video though. Good against the non security conscious.

  11. This isn't concerning at all and can be easily prevented by adding a firmware password to your mac. This is just one of thousands of things that someone with malicious intent MIGHT do a computer if they have unfettered uninterrupted physical access to your machine. I'm sure there is plenty of crap I could install on a windows box too if I had direct access to it. Shit why even mess around with this nonsense when I can simply nick it, clone it, pull the hard drive and edit it, wipe it or smash it to pieces as I am already apparently alone with it? Moral: don't let other people screw around with your computer or leave it in an insecure location. Appendix:

  12. 20 seconds yeah haha half the show to only prep to do it . I Try this on an 2014 imac and no such luck 

  13. I guess only when: a root password is blank, and / or single user mode accessible.

    In this case no need to encypt, or put a password on EFI, BIOS, UEFI, excepting you can launch an OS on USB and read the non encrypted files..

  14. You say it can also be done in a linux machine. My question is, how abaut an encrypted hard disk?

  15. Single user mode is no longer accessible without a password 

  16. It's hyphen or dash not tack. 

  17. Anyway to easily get around a Mac that has single user mode blocked? Such as a computer from a school or company.

  18. what if you are root?

Leave a comment

Your email address will not be published.