We’ll guide you through the process of using Homebrew package manager to install post-exploit security tools on macOS to further assess compromised system vulnerabilities found in your Apple equipment.
Illustration: Lisa Hornung, Getty Images/iStockPhoto
In this final article in the Homebrew series, we look at the availability of post-exploit tools you can use to further assess vulnerabilities in computing devices. You can use these to continue following the attack chain in an effort to establish permission escalation, persistence, and pivot from one compromised system to another, extending the attack throughout the network.
SEE: Apple Macbook Air 2020: Cheat sheet (Free PDF) (TechRepublic)
This part of the engagement is not about compromising the system initially: That is the exploit phase. But the post-exploit process deals with the initial level of access obtained on the compromised system and evolving it into something far more in order to obtain as much data on the underlying system and any hosts that might be communicating with it over the same network segment and beyond.
By using the proper tools, security admins and penetration testers can perform a deep dive on the system and continue the attack on subsequent systems encountered during the additional reconnaissance process