Posts

Showing posts from September, 2018

What are Rootkits..?? || techtalksgroup ||

Image
What Is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit." Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components that implement the tool. Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes. What Can a Rootkit Do? A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infecte...

What is GodMode in Windows.? And how to activate it.. || techtalksgroup ||

Image
GodMode is a special folder in Windows that gives you quick access to over 200 tools and settings that are normally tucked away in the Control Panel and other windows and menus. Once enabled, God Mode lets you do all sorts of things, like quickly open the built-in disk defragmenter, view event logs, access Device Manager, add Bluetooth devices, format disk partitions, update drivers, open Task Manager, change display settings, adjust your mouse settings, show or hide file extensions, change font settings, rename the computer, and a lot more. The way GodMode works is actually very simple: just name an empty folder on your computer as outlined below, and then instantly, the folder will turn into a super-handy place to change all sorts of Windows settings. The steps for turning on God Mode is the exact same for Windows 10, Windows 8, and Windows 7: Make a new folder, anywhere you like. To do this, right-click or tap-and-hold on any empty space in any folder in Windows, and c...

New Zero-Day Vulnerability Found Effecting All Versions of Windows || techtalksgroup ||

Image
A security researcher has publicly disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft Windows operating system (including server editions) after the company failed to patch a responsibly disclosed bug within the 120-days deadline. Discovered by Lucas Leong of the Trend Micro Security Research team, the zero-day vulnerability resides in Microsoft Jet Database Engine that could allow an attacker to remotely execute malicious code on any vulnerable Windows computer. The Microsoft JET Database Engine, or simply JET (Joint Engine Technology), is a database engine integrated within several Microsoft products, including Microsoft Access and Visual Basic. According to the an advisory released by Zero Day Initiative (ZDI), the vulnerability is due to a problem with the management of indexes in the Jet database engine that, if exploited successfully, can cause an out-out-bounds memory write, leading to remote code execution. An attacker must convince ...

Chrome vs Chromium . || techtalksgroup ||

Image
Chrome is a massively popular web browser that is developed and released by Google, and Chromium is a niche open-source browser that has far fewer users. However, Chrome and Chromium have a lot more similarities than differences. In fact, Chrome uses the same source code as Chromium, just with extra features that Google adds on top. What is Chromium? Chromium is an open-source web browser that's developed and maintained by the Chromium Project. Since it's open source, anyone is free to take and modify the source code as the please. However, only trusted members of the Chromium Project development community can actually contribute their own code. Regular users are able to download a frequently updated version of Chromium, all compiled and ready to use, from download-chromium.appspot.com . What is Chrome? Chrome is a proprietary web browser that is developed, maintained, and released by Google. Since it's proprietary, you are free to download and use it, but you...

Pure Blood v2.0 - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter ||techtalksgroup||

Image
A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter. Web Pentest / Information Gathering: Banner Grab Whois Traceroute DNS Record Reverse DNS Lookup Zone Transfer Lookup Port Scan Admin Panel Scan Subdomain Scan CMS Identify Reverse IP Lookup Subnet Lookup Extract Page Links Directory Fuzz (NEW) File Fuzz (NEW) Shodan Search (NEW) Shodan Host Lookup (NEW)   Web  Application Attack: (NEW) Wordpress  | WPScan  | WPScan Bruteforce  | Wordpress Plugin Vulnerability Checker  Features: // I will add more soon.  | WordPress Woocommerce - Directory Craversal  | Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting  | WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion  | WordPress Plugin Events Calendar - 'event_id' SQL Injection Auto SQL Injection Features: | Union Based  | (Error Output = False) Detection  | Tested on 100+ We...

Top 5 Kali Linux Tools Every Hacker Should Know All About |techtalksgroup|

Image
Top Kali Linux Tools:- Now let’s get started with the list of my favorite tools and a lot of other hackers favorite tools too. 1. Metasploit:- Metasploit is a framework for developing exploits, shellcodes, fuzzing tool, payloads etc. And it has a very vast collection of exploits and exploitation tools bundled into this single framework. It is available for all major Operating Sytems out there Windows, OS X, and Linux and comes pre-installed in Kali Linux. It is an offensive tool and to attack your own or your company’s infrastructure to check for security loopholes and to fix them before an actual attacker can break in. It can also be used to target web applications, networks, and servers etc. You get both GUI and command line interface. There are to products for Metasploit a Free Community version and a paid Metasploit Pro. 2. Nmap (Network Mapper):- Nmap is used to scan whole networks for open ports and for mapping networks and a lot more things. It is mainly used for sc...

Download The Free Kali Linux Book || tech talks group ||

Image
Whether you are new to infosec, or a seasoned security veteran, the free "Kali Linux Revealed" online course has something to teach you. the saying "You can't build a great building on a weak foundation" rings true in the information security field as well , and if you use (or want to learn to use) kali in a professional way, you should familiarise yourself as best as you can with the internals of the penetration testing distribution - and that's what this training is all about - turning you into a Kali Linux professional user. DOWNLOAD PDF -   https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf Learning how to master a kali gives you the freedom to create kali Linux  recipes like the Kali ISO of Doom, or the kali Evil Ap. you'll be able to build optimize and custom kali kernels, host them on your own repositories and create your own custom Kali Appliances - and there's so much more. After Reading This Book You Wil...

FREE AND UNLIMITED FAST SPEED WITH -VPN HUB |TechTalksGroup|

Image
VPN HUB - Free and unlimited fast speed on your mobile UNBLOCK the Internet and Browse Securely with VPN HUB for Android. Get it Free on the Google Play  Store.                                                    LINK                        https://www.vpnhub.com/ So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.  Facebook Page:-   https://www.facebook.com/theprogrammer.harshit/ Google Plus: -  https://plus.google.com/u/0/communiti…/117296242526461886479 Blog:-   https://www.techtalksgroup.blogspot.com Instagram:-   https://www.instagram.com/theprogrammer.har

Layers of OSI Model Explained .....|| tech talks group ||

Image
The Open Systems Interconnection (OSI) model defines a networking framework to implement protocols in layers, with control passed from one layer to the next. It is primarily used today as a teaching tool. It conceptually divides computer network architecture into 7 layers in a logical progression. The lower layers deal with electrical signals, chunks of binary data, and routing of these data across networks. Higher levels cover network requests and responses, representation of data, and network protocols as seen from a user's point of view. The OSI model was originally conceived as a standard architecture for building network systems and indeed, many popular network technologies today reflect the layered design of OSI. 1. Physical Layer  At Layer 1, the Physical layer of the OSI model is responsible for ultimate transmission of digital data bits from the Physical layer of the sending (source) device over network communications media to the Physical layer of the rece...

Everything you must know about RFC or Internet Requests for Comments || tech talks group ||

Image
Request for Comments documents has been used by the Internet community for more than 40 years as a way to define new standards and share technical information. Researchers from universities and corporations publish these documents to offer best practices and solicit feedback on Internet technologies. RFCs are managed today by a worldwide organization called the Internet Engineering Task Force . The very first RFCs including RFC 1 were published in 1969. Although the "host software" technology discussed in RFC 1 has long since become obsolete, documents like this one offer an interesting glimpse into the early days of computer networking. Even today, the plain-text format of the RFC remains essentially the same as it has since the beginning. Many popular computer networking technologies in their early stages of development have been documented in RFCs over the years including Internet domain name concepts ( RFC 1034 ) Address allocation for private int...

Everything you must know about the History of Linux Operating System..||tech talks group||

Image
Linux is an operating system used to power pretty much any device you can think of. Linux Overview When most people think of Linux they think of a desktop operating system used by geeks and techies or a server-based operating system used to power websites. Linux is everywhere. It is the engine behind most smart devices. The Android phone that you are using runs a Linux kernel , that smart fridge that can restock itself runs Linux . There are smart lightbulbs that can talk to each other all with the help of Linux. Even rifles used by the army-run Linux . A modern buzz term is "the internet of things". The truth is that there really is only one operating system that powers the internet of things and that is Linux. From a business point of view, Linux is also used on large supercomputers and it is used to run the New York Stock Exchange.​​ Linux can also, of course, be used as the desktop operating system on your netbook, laptop or desktop computer. Operating S...

What is Network Application Programming Interface (Network APIs)..? || tech talks group ||

Image
An Application Programming Interface (API) lets computer programmers access the functionality of published software modules and services. An API defines data structures and subroutine calls that can be used to extend existing applications with new features, and build entirely new applications on top of other software components. Some of these APIs specifically support network programming. Network programming is a type of software development for applications that connect and communicate over computer networks including the Internet. Network APIs provide entry points to protocols and re-usable software libraries. Network APIs support Web browsers, Web databases, and many mobile apps. They are widely supported across many different programming languages and operating systems. Socket Programming Traditional network programming followed a client-server model . The primary APIs used for client-server networking were implemented in socket libraries built into operating systems. ...

How to run Windows Applications on Linux using Wine..? || tech talks group ||

Image
The goal of the Wine project is to develop a "translation layer" for Linux and other POSIX compatible operating systems that enables users to run native Microsoft Windows applications on those operating systems. This translation layer is a software package that "emulates" the Microsoft Windows API (Application Programming Interface), but the developers emphasize that it is not an emulator in the sense that it adds an extra software layer on top of the native operating system, which would add memory and computation overhead and negatively affect performance. Instead, Wine provides alternative DDLs (Dynamic Link Libraries) that are needed to run the applications. These are native software components that, depending on their implementation, can be just as efficient or more efficient than their Windows counterparts. That is why some MS Windows applications run faster on Linux than on Windows. The Wine development team has made significant progress toward...