Grabbing and cracking macOS hashes
infonews
security
Source: Embrace The RedApril 3, 2022
Summary
On macOS, attackers can extract password hashes from the local directory service (the system that stores account information) using the dscl command tool, even when System Integrity Protection is enabled, then convert these hashes to a format that hashcat (a password-cracking tool) can process to crack the passwords. This technique is particularly dangerous when organizations reuse the same admin password across multiple Mac computers, making lateral movement (spreading access across a network) easier for attackers.
Classification
Attack SophisticationModerate
Original source: https://embracethered.com/blog/posts/2022/grabbing-and-cracking-macos-hashes/
First tracked: February 12, 2026 at 02:20 PM
Classified by LLM (prompt v3) · confidence: 95%