Next, we need to get iTerm2 using the download link on its website. The ~ character represents the home directory. Since we're about to download a file, I think the best place to put it is in our "Downloads" folder, so let's navigate there with the below command. When Terminal is first opened, the working directory is your home directory. Step 1: Get iTerm2įirst, go ahead and open the Terminal app. As I said, this is to help new hackers get used to command line. You can download iTerm2 directly from its website, but I want to show the install process using the macOS Terminal app instead. This is why I recommend iTerm2, which has all of the features of Terminal and more.Ī few of my favorite iTerm2 features are a mouse-less copy, autocomplete, and, last but not least, a hotkey terminal window. It's a solid choice, but it lacks some features that I personally like having access to.
Terminal.app features a plethora of color schemes, window groups, terminal tabs, a split pane, some man page integration, and transparency. You can just search Spotlight for "Terminal" to open it quickly. The default macOS terminal app is simply called Terminal and is located in the "Utilities" folder in Applications. Previously: How to Manage Your Passwords with KeePassX.If you're old hat and already have a solid grip on the command line, a refresher never hurts. Doing the installation in this way will help new users get familiar with the CLI (command line interface). In this article, we will be using your Mac's default Terminal app to install iTerm2. An honorable mention goes out to Cathode, which attempts to replicate the feel of using an old terminal. For macOS, my preferred terminal emulator is iTerm2. A good terminal emulator will help us manage our workflow efficiently.
We want something that is appealing to our eye, feature-rich, and stable. We're going to be spending a lot of time working with the terminal, so the goal is to be comfortable with it. The terminal is a key component of any pentester's setup. Now that we've talked about encryption and managing your passwords, let's continue this series on getting your Mac ready for hacking by turning our attention to the terminal.