Macos List Ports For Process

During the porting process, audit your code to identify fixes for any potential architectural issues. For example, look for places where your code relies on specific hardware features or configurations. The following list identifies several known architectural differences between Apple silicon and Intel-based Mac computers. Mac OS X comes with a built-in firewall service that can be used to protect your Mac from online security risks. The firewall sits between OS X and the internet and only allows incoming traffic to. You'll see a list of currently running processes. At the top of the list is an overview of the processes that are running and the resources they're consuming. Kill an unwanted process. When you identify a process that's causing a problem or consuming too many resources, take note of the number in the PID column next to the name of the process. On my system, to find which port is being used by a process with process id 9260, I run netstat -aon findstr 9260 As you can see in the above output, process 9260 is using port 8080. Hello, On Linux, I can use 'ps -efL grep processname' to list all threads that belong to a running process.L has a different meaning on AIX and I could not find an equivalent flag in the man pages.

What ports are open for hacking on my Mac and Linux machine?

  • Processes Tour

Here is how to see what ports are open listening on a server.

This is perhaps the most important potential vulnerability.

Having ports listenting to outside traffic also takes CPU effort,which consumes electricity and thus reduce battery life.

Spotlight on Network Utility to List Ports

Apple’s macOS Spotlight is like Window’s Search omni-box.*

  1. Press Command+Spacebar.

  2. Type the name of utilities that are buried, such asNetwork Utility.

  3. Click the keyboard return/enter key to launch the Network Utility app.

  4. Select the 'Port Scan' tab.

  5. Enter the IP (such as, localhost, or domain name you wish to scan for open ports.

  6. Choose scan to see what ports the server responds to.

List open files = lsof

  1. In a Terminal command line:

    PROTIP: If you’ll be using this often, create an alias such as of.

    “lsof” is a contraction for “list open files”.Without any options specifications, lsof lists all open files belonging to all active processes.

    “-nP” is a combination of “n” for no resolution of IPs to hostnames using DNSand “P” for no resolution of Port names from numbers.

    This is because the command already takes several seconds to run.

    “+c 15” specifies command width of 15.

    Piping to grep filters out only lines containing “LISTEN”.

    NOTE: All options are shown by this command:

    lsof -h


  2. Drag your Terminal window wider to remove word-wrap.

“FD” column lists File Descriptors. “u” is for read and write mode. “r” for read only, “w” for write-only.

Linux requires root on operations for well-known ports below 1024.


Registered Ports: 1024 through 49151.

Dynamic/Private : 49152 through 65535.

TCP (Transmission Control Protocol) is the most commonly used protocol on the Internet and any TCP/IP network. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP on ort 53.

UDP (Datagram Protocol) is connectionless and does not guarantee reliable communication; it’s up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming, where dropping some packets is preferable to waiting for delayed data.

Processes Tour

NOTE: Drag the scroll bar to see what is beyond what is displayed.

mongod is MongoDB listening on port 27017.

I should keep that closed unless I need it.

In Node, close all connections when the app closes completely:


When I search for “2BUA8C4S2C” I see “” in folder /Users/mac/Library/Group Containers

This says This port is used only on the loopback interface ( for the 1Password extension to talk to the 1Password Agent. It should be safe to firewall it from any sources other than If you do a packet capture on lo0 and then filter by tcp.port 6258 you can see what traffic is being passed. Nothing is transmitted in the clear.

Skype I don’t mind keeping open. I use it a lot.

Dropbox - why does it need to be kept open?

I’ll use just their web page when I need it.


Macos List Ports For Processes

Resiliox20Sync I used once to get a file.

In Resilio Preferences, uncheck “Start Resilio Sync on startup”.

Macos List Ports


XMPP ports 56989 and 56990

For a list of processes on Mac:

ftp (tftp) should not appear.



Scan other machines

  1. Install

    brew install nmap

  2. There are a lot of options

    nmap -h

    The format:

    nmap [scan type] [options] {target specification}

  3. There are a lot of options

    nmap -h


https://www.zeek.orgZeek (formerly Bro) and/or https://www.snort.orgSnortNetwork Intrusion detection systems (NIDS) Open Source SIEM (OSSIM) with Open Threat Exchange (OTX)Security Information and Event Management (SIEM) software

CompTIA CySA+ (CSO-001) exam launched April 21, 2020 on Vue & Pearson online$359 to answer 75% of 85 questions in 165 minutes


  1. Threat and vulnerability management:

    1. Explain the importance of threat data and intelligence.
    2. Given a scenario, utilize threat intelligene to support organizatoinal security.
    3. Given a scenario, perform vulnerability management activities.
    4. Given a scenario, analyze the output from common vulnerability assessment tools.
    5. Explain the threats and vulnerabilities associated with operating in the cloud.
    6. Given a scenario, implement controls to mitigate attacks and software vulnerabilities.
  2. Software and systems security
    1. Given a scenario, apply security solutions for infastructure management
    2. Explain software assurance best practices
    3. Explain hardware assurance best practices
  3. Security operations and monitoring:
    1. Given a scenario, analyze data as part of security monitoring activities.
    2. Given a scenario, implement configuration changes to existing controls to improve security.
    3. Explain the importance of proactive threat hunting.
    4. Compare and contrast automation concepts and technologies.
  4. Incident response
    1. Explain the importance of the incident response process.
    2. Given a scenario, apply the appropriate incident response procedure.
    3. Given an incident, analyze potential indicators of compromise.
    4. Given a scenario, utilize basic digital forensics techniques.
  5. Compliance and assessment
    1. Understand the importance of data privacy and protection
    2. Given a scenario, apply security concepts in support of organizational risk mitigation
    3. Explain the importance of frameworks, policies, procedures and controls.

More on OSX

This is one of a series on Mac OSX:

Please enable JavaScript to view the comments powered by Disqus.