This document summarizes a talk about attacking MacOS environments. It discusses setting up command and control with Mythic, initial access techniques like using Microsoft Word macros and 0-day exploits, persistence methods like login items and launch agents, collecting data like AD credentials, browser cookies and files using techniques like bypassing transparency consent and control protections, and hardening MacOS environments through enrollment in MDM and security policy enforcement. Examples of collecting OpenVPN credentials, NoMAD credentials storing in the keychain, bypassing Firefox password encryption, and accessing cloud credentials in the home directory are provided.