Quick script to automate some basic tasks done during a OSX Thick Client or Software Penetration Test. Checks for things like ARC, PIE, Canary, Codesignature Flags, NSFileProtect, Signature and more.
cd /opt/Thick-Client
git clone https://github.com/GainSec/Mac-OSX-Application-Fingerprint-And-Security-Tool
cd Mac-OSX-Application-Fingerprint-And-Security-Tool
chmod +x moafast-v1.py
This was tested on a OSX box and requires the following tools:
nm otool strings spctl codesign dsymutil
- Jon Gaines - Creator - GainSec - Managing Security Consultant @NetSPI
- Create output template rather then have unique 3 line print statements in each function
- add function to run against all files in a dir
- ??
This project is licensed under the GNU License - see the LICENSE.md file for details
- ./moafast-v1 --o ~/Desktop/Engagements/GainSec/Thick-Client/Output/ --f GainSec.app/Contents/MacOS/GainSec
OR
- python3 moafast-v1.py --o ~/Desktop/Engagements/GainSec/Thick-Client/Output/ --f GainSec.app/Contents/MacOS/GainSec