Hackear Un Mac

Páginas: 11 (2612 palabras) Publicado: 26 de septiembre de 2012
Hack a Mac
With only 30 minutes of physical access.

by
Jeff Browning
Evan Savage
and
Alex Galvin

Published by

2

Disclaimer:
The information contained in this guide is for informational purposes only. Any
instructions in this guide are intended to be performed on a machine that you have
permission to use, as well as permission to execute the following commands and
proceduresupon. We take absolutely no responsibility for any damages of any kind
resulting from the use of any knowledge in this guide. By reading further, you agree
release HackMac.org from any and all liability, and assume all responsibility for your
own actions.
No part of this publication shall be reproduced, transmitted, or sold in whole or in part in
any form, without the prior written consent ofthe author. All trademarks and registered
trademarks appearing in this guide are the property of their respective owners.
Users of this guide are advised to use their own due diligence when it comes to making
any sort of decisions and all information, products, and services that have been
provided should be independently verified by your own qualified professionals. By
reading this guide, youagree that HackMac.org and its authors are not responsible for
the success or failure of your decisions relating to any information presented in this
guide.

© 2011 HackMac.org
All Rights Reserved

3

Table of Contents
Chapter 1: The Admin Hack!

5

Boot into Single-User Mode !

6

Mount the Hard Drive !

6

Remove the “Setup has been completed” File !

6

Reboot!

7Watch the Video!

7

Continue Setup!

7

Set up the Administrator Account!

8

Finish Setup and Log In!

8

Chapter 2: Enable The Root User!

9

Option 1: Enable Root Via GUI!

10

Option 2: Enable / Change Root Password Via Terminal!

11

Chapter 3: Removing Traces !

12

Log Out and Login as Root!

13

Delete The Administrator Account!

13

Chapter 4:Enable SSH!

14

Option 1: Enable SSH Via GUI!

15

Option 2: Enable SSH Via Terminal!

15

Chapter 5: Obtain The Password Hash!

17

4
Log in and open Terminal.!

18

Finding the GUID (Globally Unique Identifier)!

18

The Password Hash!

19

Obtaining the Hash!

19

Chapter 6: Decrypting The Hash!

20

Create a Text File Containing the Hash!

21

Navigatingto John the Ripper!

22

Cracking the Password with John the Ripper!

22

5

Chapter 1: The Admin Hack
Approximate time: 24 minutes

6
Boot into Single-User Mode
Turn on the computer. When you hear the startup chime hold down the keys CMD+S.
This key combination boots the computer into Single-User Mode (SUM), giving you
temporary root access. It is important to note that thiscan be blocked by a firmware
password. If that’s the case, take a look at our guide on how to get into single-user
mode while locked.

Mount the Hard Drive
Once you’ve booted into SUM (it should look like a black screen with white text) we
need to mount the hard drive to be able to modify files. To do so, type in the following
after the prompt:

/sbin/mount -uw /

Remove the “Setup hasbeen completed” File
Now that the drive is mounted and we can edit the file system, we need to delete a file
that tells your computer that you have completed setup. Mac OS X checks for this file
every time it boots up, and by deleting it, we will effectively trick the computer into
believing it’s brand new and you need to set up an administrator account. To delete the
file, type in:

rm/var/db/.applesetupdone

This deletes the afore mentioned file (aptly named “.applesetupdone”), which is stored
in the /var/db/ directory.

7

Reboot
This step is pretty self explanatory. We need the system to exit SUM and reboot so that
it can check for the file we just deleted and not find it. Type in the following and press
return:

reboot

Watch the Video
Your computer will...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Hack
  • Hacker
  • Hacker
  • hacker
  • Hack
  • hack
  • Hacker
  • Hacker

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS