Homebrew: How to install vulnerability tools on macOS


We’ll guide you by means of the process of using Homebrew package manager to install security tools on macOS to assess vulnerabilities and the security position from the devices on your system.


Illustration: Lisa Hornung, Getty Images/iStockPhoto

A lot more about Apple

When attempting in order to determine the security posture from the devices on your organization’s system, performing security assessments is the next logical step. This type of assessment serves to suss out any deficiencies which exist inside the client systems compared with the present known baseline of pads for your operating system and the applications installed therein.

SEE:   iPhone 12 event: What Apple announced at its 2020 Hi Speed event (free PDF)   (TechRepublic)

After performing reconnaissance to find out the amount of devices to scan and determine the type of devices, their own OSes, and the apps and providers installed on them, a correct plan to carry out the vulnerability assessment may be developed.  

In purchase to carry out the evaluation, it is important to recognize which tools will be necessary. A few tools may be used in order to obtain vulnerability information from common devices, while other tools are usually suited only to identify particular vulnerabilities related to certain types associated with applications and services, such because web servers, for example. The tools included in this list signify the vulnerability scanners that are usually available via Homebrew for macOS and include a brief description of how those tools work greatest.

SEE:   Homebrew: Exactly how to install reconnaissance tools upon macOS   (TechRepublic)


A popular suite of tools used to assess, crack, and manipulate wireless network traffic through supervising, attacking, testing, and cracking security. The tool is feature-rich plus focuses heavily on command-line use to automate much of the processes using scripts to test the security and harden your organization’s wireless networks.

brew install aircrack-ng


A Python -based tool that scans and analyzes VPN concentrators for the particular Internet Key Exchange (IKE) process, which may provide indicators of misconfigurations and errors after determining VPN servers through discovery and fingerprint scanning.

brew install iker


Another Python script, this a single, however, can be used to identify the particular various header information provided by web servers when connections are created. The particular headers may be used to provide keen insight into the web server’s configuration, especially safety details pertaining to how the particular server handles XSS protections, regarding example.

brew set up headercheck

DISCOVER:   Homebrew: How to install reconnaissance tools on macOS   (TechRepublic)


A user-level shell used to access NFS servers remotely and for analyzing mounts. It can be used in the detection of protection issues.

brew set up nfsshell


The acronym means Nessus-based Offline Patch Checker, and the tool aims to retrieve vulnerability evaluation from UNIX-based systems, like Linux distributions and macOS, amongst others. It works by comparing data from Nessus’ database and the gadgets themselves to identify missing spots. Information may be exported to CSV format including CVSS scoring data, as well.

make install nopc


PERL-based script used to enumerate the security settings of the RDP protocol, or even Terminal Services by checking which usually services are supported and, of course, which ones are present. Features consist of targets file and saving the particular tool output to a specific logfile.

brew set up rdp-sec-check


Version 2 of the SSLScan tool scans devices to discover supported security protocols and ciphers. A number of checking settings are present, allowing for scanning to occur as broad or even granular as necessary.

brew install sslscan2

SEE:   How to install typical security tools via Homebrew on a Mac   (TechRepublic)


A PERL script used to detect legacy plus newer versions of security protocols and network services such as FTP, RDP, and SMTP, to get example. Output might be logged in order to exportable files and it is human-readable and greppable .

brew install ssl-cipher-suite-enum


This script checks for what slots are being used on a server, which security protocols/ciphers are being used, and works on several different systems. Furthermore, data output is kept private and might be exported to standalone forms, such as CSV and JSON for usage with other equipment.

brew install testssl


Fuzzing applications is an essential part of the assessment procedure. Used to determine if any kind of vulnerabilities exist, this application may be coupled with supported plugins to extend functionality and may even be used with other tools.  

brew install wfuzz


Since the tool is named, this software program is used to compare the route level of a device against the vulnerability database maintained by Microsof company. The output provided by this particular tool may also be used to find out if the vulnerabilities recognized have been publicly exploited plus if Metasploit modules exist regarding them as well. Lastly, the tool itself serves as the means to patch vulnerable gadgets and report the findings to a file for later review.

brew install windows-exploit-suggester


A Ruby-based script that is used to assess web servers running the WordPress blogging system to determine the security degree of the servers.  

brew install wpscan


This will be another Ruby-based script that is usually capable of scanning for susceptible third-party web applications and front-ends. It allows admins to cross-reference known vulnerabilities which you can use to distantly exploit a server running affected software 

brew set up yasuo

Also see