

Step 2: Choose a payload to use from metasploitīefore we create a payload, we need to choose a meterpreter payload. We will be using meterpreter in this tutorial.

We can spawn 4 different types of trojans (also known as payloads): beacon, creds, meterpreter, and meterpreter-grant.

If we scroll down to the bottom, we can see the options listed. To start up the tool and see the options, we can type in. Now we want to enter the macphish directory and see the files. We need to start by downloading macphish from GitHub. By giving macphish an IP address, a listening port, a payload, and a trojan type, we can generate an applescript that will run create a backdoor. Macphish is a tool that automatically generates applescripts that will allow you to gain remote access to a computer. Send the file to the victim and wait for him to click on it – with a bit of social engineering, we can trick the victim into running our trojan file.With metasploit, we can create our key in the form of meterpreter, allowing us to access the computer. Start a meterpreter session – creating a backdoor does nothing if we don’t have the key for it.Create an application that will run the script – using mac’s script editor, we can paste our applescript into the script editor and create a file that will run our script.Generate a payload in macphish – once we give it the parameters, macphish will do all the hard work and create an applescript.We need to use a python-based payload, but metasploit has a lot of those. Choose a payload from metasploit – for macphish to work, we need to give it a payload to run.Download macphish – a program that will allow us to create custom applescripts that open up a backdoor on the victim’s computer.In this tutorial, we will be using Kali Linux to hack into a mac computer. We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to and affiliated sites. Any sales will support our content creators. Note: If you do not have Kali Linux, you can buy a pre-made ready to boot USB with Kali Linux on it from here (Amazon). Note: If you do not have Kali Linux, you can buy a pre-made ready to boot USB with Kali Linux on it from our shop or you can buy Kali Linux on Amazon.
