sw_vers
β Print Mac OS X operating system version informationsystem_profiler
β Reports system hardware and software configuration.system_profiler SPHardwareDataType
β Hardware overview.hostinfo
β Host information.nvram -p
β Print all of the firmware variables.getconf DARWIN_USER_CACHE_DIR
β Retrieve standard configuration variables/usr/libexec/path_helper
β Helper for constructing PATH environment variable
I have moved this over to the Tech Interview Cheat Sheet Repo and has been expanded and even has code challenges you can run and practice against!
\
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# OSX for Hackers (Mavericks/Yosemite) | |
# | |
# Source: https://gist.github.com/brandonb927/3195465 | |
#!/bin/sh | |
# Some things taken from here | |
# https://github.com/mathiasbynens/dotfiles/blob/master/.osx | |
# Ask for the administrator password upfront |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
" _ _ " | |
" _ /|| . . ||\ _ " | |
" ( } \||D ' ' ' C||/ { % " | |
" | /\__,=_[_] ' . . ' [_]_=,__/\ |" | |
" |_\_ |----| |----| _/_|" | |
" | |/ | | | | \| |" | |
" | /_ | | | | _\ |" | |
It is all fun and games until someone gets hacked! |
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.
Function | Shortcut |
---|---|
New Tab | β + T |
Close Tab or Window | β + W (same as many mac apps) |
Go to Tab | β + Number Key (ie: β2 is 2nd tab) |
Go to Split Pane by Direction | β + Option + Arrow Key |
Cycle iTerm Windows | β + backtick (true of all mac apps and works with desktops/mission control) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
I found this list by chance. It is located at: https://code.google.com/p/pentest-bookmarks/wiki/BookmarksList | |
Its a bit old (compiled in 2012), but links may still be valid. | |
------------------ | |
Hacker Media | |
Blogs Worth It: | |
What the title says. There are a LOT of pentesting blogs, these are the ones i monitor constantly and value in the actual day to day testing work. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?xml version="1.0"?> | |
<opml version="1.0"> | |
<head> | |
<title>Liferea Feed List Export</title> | |
</head> | |
<body> | |
<outline title="n1tr0g3n Feed List" text="n1tr0g3n Feed List" description="n1tr0g3n Feed List" type="folder"> | |
<outline title="Android" text="Android" description="Android" type="folder"> | |
<outline title="Phandroid" text="Phandroid" description="Phandroid" type="rss" xmlUrl="http://phandroid.com/feed/" htmlUrl="http://phandroid.com"/> | |
<outline title="xda-developers software-hacking" text="xda-developers software-hacking" description="xda-developers software-hacking" type="rss" xmlUrl="http://forum.xda-developers.com/external.php?type=RSS2" htmlUrl="http://forum.xda-developers.com/"/> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Books to look for: | |
http://www.barnesandnoble.com/w/a-bug-hunters-diary-tobias-klein/1110853653?ean=9781593273859 | |
http://www.barnesandnoble.com/w/malware-forensics-cameron-h-malin/1111450972?ean=9781597492683 | |
http://www.barnesandnoble.com/w/hacking-web-apps-mike-shema/1110781208?ean=9781597499514 | |
http://www.barnesandnoble.com/w/professional-penetration-testing-thomas-wilhelm/1117354019?ean=9781597499934 | |
http://www.barnesandnoble.com/w/the-hackers-guide-to-os-x-robert-bathurst/1111893150?ean=9781597499507 | |
http://www.barnesandnoble.com/w/carry-on-bruce-schneier/1115806332?ean=9781118790816 | |
http://www.barnesandnoble.com/w/phishing-dark-waters-christopher-hadnagy/1120616529?ean=9781118958476 | |
http://www.barnesandnoble.com/w/network-security-through-data-analysis-michael-collins/1117219990?ean=9781449357900 | |
http://www.barnesandnoble.com/w/practical-reverse-engineering-bruce-dang/1118229651?ean=9781118787311 |
OlderNewer