TOLL Mac OS

  1. Tool Macros
  2. Windows Media Creation Tool Mac Os
  3. Snipping Tool Mac Os

I was playing with Metasploit Framework and I was using the msfvenom payload. For that purpose I was using Kali Linux as a Virtual Machine, mainly because all the tools are pre-installed there. Running a Virtual Machine is not as easy as running the tools in a host Operating System. The available RAM of course is much less than the actual host and some times configuring things can be complex.

Nmap (Free)

DAEMON Tools for Mac OS The usual format that will help the users to relate to the software is MDX format that you can find at the end of the files. Those are the types of files that are supported by the disc image formats and are probably one of the most commonly used formats for configuring disk images. The improved retouch tool in Photos requires MacBook Pro (15-inch and 16-inch models) introduced in 2016 or later, MacBook Pro (13-inch models) introduced in 2020, MacBook Air introduced in 2020, iMac (Retina 5K models) introduced in 2014 or later, iMac (Retina 4K models) introduced in 2017 or later, iMac Pro (all models), Mac mini introduced. Dec 11, 2019 Within the Xcode Command Line toolkit, Mac users gain access to numerous useful tools, utilities, and compilers, including make, GCC, clang, perl, svn, git, size, strip, strings, libtool, cpp, and many others. All of these commands are a default part of Linux systems and programs.

Nmap is the best port scanning tool you can use and also open source. Used widely, mainly because of the incredible power and flexibility it offers. On Mac OS Nmap comes with ZenMap, in the installation pack. For those who don’t like the terminal Zenmap is the perfect tool. I prefer using Nmap but in some cases, like for example when you have multiple hosts to scan, Zenmap makes reading them much easier.

Installation of Nmap is really simple and it does not require any typing at all. You can just download a .dmg file from the official website and do a normal installation like in every other application.

Links: Nmap – Github

Nikto (Free)

Nikto comes pre-installed on Kali Linux and some times it can help you find some hidden Gems on the web server you are testing. Nikto is a Web Server scanner that will inform you in case there is an outdated software version, if it finds some insecure or default files / directories and about some possible server misconfigurations.

In order to install Nikto you need to install Homebrew. To install Homebrew you need to type a single command on your terminal.

After installation if you didn’t agree with the Terms of Service of X-Code you will probably need to follow the instuctions. The instructions are pretty clear and simple to follow. Next you have to install Nikto. Go back to your terminal and type the following.

After finishing the installation you will be able to scan every web server using the command nikto -h {URL}.

Links: Homebrew – Github – Nikto

Wireshark (Free)

The Wireshark is the most known Network Traffic Sniffer, that is open-source like all the tools so far. The Wireshark distribution also comes with TShark, which is aline-oriented sniffer (similar to Sun’s snoop, or tcpdump) that uses thesame dissection, capture-file reading and writing, and packet filteringcode as Wireshark, and with editcap, which is a program to read capturefiles and write the packets from that capture file, possibly in adifferent capture file format, and with some packets possibly removed from the capture.

Installation is pretty simple, since it come as a .dmg file and the installation is like on every other application on Mac OS. After installation a new icon will appear on the launchpad’s application list. From there just by clicking it you can start sniffing the network traffic, after specifying the interface you would like to intercept.

Links: Wireshark – Github

Sqlmap (Free)

The Sqlmap is a powerful tool for finding SQL injections. It is completely automated and just by specifying a parameter the tool will try to exploit the injectable parameter sometimes even without you having to specify the type of database. It supports multi databases including SQL and non-SQL databases. Installation is pretty simple by using brew.

When the installation is complete you can just type sqlmap on terminal to launch the tool.

Links: sqlmap – Github

Zed Attack Proxy (Free)

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

The easiest way to install ZAP is by using brew. Start by installing caskroom.

After the installation is complete the system is ready to install ZAP.

After the installation is complete a new ZAP icon will appear on the launchpad.

Links: OWASP ZAP – Github

Burp Suite (Free / Paid)

My personally favourite proxy tool is Burp Suite. It offers pretty much the same options as ZAP, with better and much easier to use design. This is only for the Community version. The paid version offers automated fuzzing, with good results, it offers Intruder, a function to repeat requests for fuzzing, with custom wordlist, support for regular expressions and much more. Intruder is also available for the Community version, but it has a throttling that can be a bit slow. Installing Burp is really easy, you just need to visit their website and they offer an option for Mac OS, and you just download an install the .dmg file.

Links: Burp Suite

Aircrack-ng

Unluckily the tool for every Wi-Fi pentration testing is partially available on OS X. You can do a really simple installation of the Aircrack-ng with macports, but Airodump-ng and Aireplay-ng are linux only and will not work under OS X native, so for reinjecting and sniffing you will have to use other means.

After finishing the installation you can use it by typing aircrack-ng and the options you prefer.

Links: Aircrack-ng – Github

TestSSL (Free)

TestSSL is the best tool to test the SSL configuration of the server you are testing. What I like the most about TestSSL is the clean UI it offers and the simplicity in use. You get different results depending on the device you want to have as a reference and writes in really clean form the possible vulnerabilities of the current configuration.

To install TestSLL you firstly have to download the git repository from Github. Current stable version is 2.8.

Then go to the folder of TestSSL.

If you want to run TestSSL on a server you can just execute the .sh file followed by the URL of the website.

Links: TestSSL – Github

Wappalyzer (Free)

This browser extension is available for both Firefox and Chrome, giving users the ability to really easily identify technologies used on a Web Application. This simple plugin displays versions of web server servers, libraries, programming languages and more. What makes this plugin so helpful is it’s accuracy, how easy is it to use and of course it is open source. I find out about this plugin a few months back and I am using it extensively, so it is worth a shot.

Links: Firefox – Chrome – Github

Gobuster (Free)

Great tool for enumerating directories, files and DNS subdomains. What I like about Gobuster is the flexibility if offers with extensions, authentication and mainly support for multithreading. I was mainly using dirb for enumerating files and directories, but what was the biggest concern for me was the fact that dirb does not support multiple threads, and this makes the process really slower. Using brew is it easy to install Gobuster.

Links: Github

Hashcat (Free)

Great tool for password recovery. Supports almost every known hashing algorithm and masking for password guessing. It can fully utilize your Mac’s performance while it offers great support for GPUs.

Links: Hashcat – Github

Let us know if you liked the post.
-->

Summary

This article describes some useful tools for Microsoft Outlook for Mac.

More information

Outlook Search Repair

The Outlook Search Repair tool repairs search results within Outlook.

Toll

Important

Due to some changes in macOS Mojave, this tool no longer works in 10.14 and higher. If you are on macOS Mojave (10.14), you can follow the steps below to reindex Spotlight for Outlook for Mac.

  1. Choose Apple menu, then System Preferences, and then Spotlight.

  2. Select the Privacy tab.

  3. In Finder:

    1. On the Go menu, select Go to Folder...

    2. Copy and paste the following location into the 'Go to the folder:' dialog box and select Go:

      ~/Library/Group Containers/UBF8T346G9.Office/Outlook/Outlook 15 Profiles/

  4. Drag the 'Main Profile' folder to the Privacy tab. Once added, remove the folder, and Spotlight will re-index the folder.

    You must perform this step for any additional profile folders you have.

See the following article from Apple to learn more: How to rebuild the Spotlight index on your Mac.

When to use the tool

Use this tool if search results within Outlook show nothing or return older items only. For example, if you search for an email message that you already have open and that message isn't displayed in the search results.

How to use the tool

  1. Download and open the Outlook Search Repair tool.

  2. Follow the instructions.

    Note The tool searches for duplicate installations of Outlook. If no duplicates are detected, go to step 3. If duplicates are detected, remove the duplicate Outlook installations, and then restart the system. After your system is restarted, the Outlook Search Repair tool may reopen. If it does reopen, exit and restart the tool.

  3. Select Reindex.

    Note The Outlook Search Repair tool displays a 'Reindexing, please wait' message while it works. Wait for this process to finish. This may require an hour or more, depending on the size of your Outlook profile. Outlook doesn't have to be open when the repair occurs. A spotlight search will be slower and may not finish while the index is being repaired.

  4. Exit the Outlook Search Repair tool when you receive the following message after the repair is completed:

    Done! Reindexing has completed!

OutlookResetPreferences

The Outlook Reset Preferences tool resets all Outlook preferences to their default settings.

When to use the tool

Use this tool to reset any customizations that you've made to Outlook by using the Preferences option on the Outlook menu. This tool also stores the settings for the Outlook window size and position. This tool shouldn't be needed most of the time. But it can be useful.

Note The Outlook Preferences file doesn't contain all the preferences for the application. Also, resetting Outlook preferences doesn't remove email messages or account settings.

How to use the tool

  1. Download and open the Outlook Reset Preferences tool.
  2. Click the Reset Now! button. This closes Outlook if it's open, and then resets the preferences to their default settings.
  3. Exit the Outlook Reset Preferences tool.

SetDefaultMailApp

The Default Mail Application tool lets you easily make Outlook the default mail application.

When to use the tool

Use this tool if you want Outlook to open a new email message when you click a mailto: link in an email message or on a website. Selecting a mailto: link opens the default email application. Outlook isn't the default email application until you change that setting.

How to use the tool

  1. Download and open the Default Mail Application tool.
  2. In the Default Mail Application dialog box, select com.microsoft.outlook, and then click Make Default.
  3. Exit the Default Mail Application tool.

ResetRecentAddresses

Tool Macros

Tool

The Reset Recent Addresses tool lets you reset recent addresses that Outlook stores. This tool deletes all recent addresses instead of you having to manually delete addresses one at a time.

When to use the tool

Windows Media Creation Tool Mac Os

When you compose an email message and add people on the To, Cc, or Bcc line, Outlook suggests names as you type characters. The list of names that Outlook uses is a combination of stored contacts, the company directory, and recent contacts. Recent contacts have an 'X' character next to each name. Without this tool, you have to click the 'X' on each contact to remove that contact from the Recent Address List. The Reset Recent Addresses tool cleans out all recent addresses at the same time.

How to use the tool

Snipping Tool Mac Os

  1. Download and open the ResetRecentAddresses tool.
  2. Click the Reset Now! button.
  3. Exit the Reset Outlook Recent Addresses tool.