Posts

What are Rootkits..?? || techtalksgroup ||

Image
What Is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit." Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components that implement the tool. Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes. What Can a Rootkit Do? A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infecte...

What is GodMode in Windows.? And how to activate it.. || techtalksgroup ||

Image
GodMode is a special folder in Windows that gives you quick access to over 200 tools and settings that are normally tucked away in the Control Panel and other windows and menus. Once enabled, God Mode lets you do all sorts of things, like quickly open the built-in disk defragmenter, view event logs, access Device Manager, add Bluetooth devices, format disk partitions, update drivers, open Task Manager, change display settings, adjust your mouse settings, show or hide file extensions, change font settings, rename the computer, and a lot more. The way GodMode works is actually very simple: just name an empty folder on your computer as outlined below, and then instantly, the folder will turn into a super-handy place to change all sorts of Windows settings. The steps for turning on God Mode is the exact same for Windows 10, Windows 8, and Windows 7: Make a new folder, anywhere you like. To do this, right-click or tap-and-hold on any empty space in any folder in Windows, and c...

New Zero-Day Vulnerability Found Effecting All Versions of Windows || techtalksgroup ||

Image
A security researcher has publicly disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft Windows operating system (including server editions) after the company failed to patch a responsibly disclosed bug within the 120-days deadline. Discovered by Lucas Leong of the Trend Micro Security Research team, the zero-day vulnerability resides in Microsoft Jet Database Engine that could allow an attacker to remotely execute malicious code on any vulnerable Windows computer. The Microsoft JET Database Engine, or simply JET (Joint Engine Technology), is a database engine integrated within several Microsoft products, including Microsoft Access and Visual Basic. According to the an advisory released by Zero Day Initiative (ZDI), the vulnerability is due to a problem with the management of indexes in the Jet database engine that, if exploited successfully, can cause an out-out-bounds memory write, leading to remote code execution. An attacker must convince ...

Chrome vs Chromium . || techtalksgroup ||

Image
Chrome is a massively popular web browser that is developed and released by Google, and Chromium is a niche open-source browser that has far fewer users. However, Chrome and Chromium have a lot more similarities than differences. In fact, Chrome uses the same source code as Chromium, just with extra features that Google adds on top. What is Chromium? Chromium is an open-source web browser that's developed and maintained by the Chromium Project. Since it's open source, anyone is free to take and modify the source code as the please. However, only trusted members of the Chromium Project development community can actually contribute their own code. Regular users are able to download a frequently updated version of Chromium, all compiled and ready to use, from download-chromium.appspot.com . What is Chrome? Chrome is a proprietary web browser that is developed, maintained, and released by Google. Since it's proprietary, you are free to download and use it, but you...

Pure Blood v2.0 - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter ||techtalksgroup||

Image
A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter. Web Pentest / Information Gathering: Banner Grab Whois Traceroute DNS Record Reverse DNS Lookup Zone Transfer Lookup Port Scan Admin Panel Scan Subdomain Scan CMS Identify Reverse IP Lookup Subnet Lookup Extract Page Links Directory Fuzz (NEW) File Fuzz (NEW) Shodan Search (NEW) Shodan Host Lookup (NEW)   Web  Application Attack: (NEW) Wordpress  | WPScan  | WPScan Bruteforce  | Wordpress Plugin Vulnerability Checker  Features: // I will add more soon.  | WordPress Woocommerce - Directory Craversal  | Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting  | WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion  | WordPress Plugin Events Calendar - 'event_id' SQL Injection Auto SQL Injection Features: | Union Based  | (Error Output = False) Detection  | Tested on 100+ We...

Top 5 Kali Linux Tools Every Hacker Should Know All About |techtalksgroup|

Image
Top Kali Linux Tools:- Now let’s get started with the list of my favorite tools and a lot of other hackers favorite tools too. 1. Metasploit:- Metasploit is a framework for developing exploits, shellcodes, fuzzing tool, payloads etc. And it has a very vast collection of exploits and exploitation tools bundled into this single framework. It is available for all major Operating Sytems out there Windows, OS X, and Linux and comes pre-installed in Kali Linux. It is an offensive tool and to attack your own or your company’s infrastructure to check for security loopholes and to fix them before an actual attacker can break in. It can also be used to target web applications, networks, and servers etc. You get both GUI and command line interface. There are to products for Metasploit a Free Community version and a paid Metasploit Pro. 2. Nmap (Network Mapper):- Nmap is used to scan whole networks for open ports and for mapping networks and a lot more things. It is mainly used for sc...

Download The Free Kali Linux Book || tech talks group ||

Image
Whether you are new to infosec, or a seasoned security veteran, the free "Kali Linux Revealed" online course has something to teach you. the saying "You can't build a great building on a weak foundation" rings true in the information security field as well , and if you use (or want to learn to use) kali in a professional way, you should familiarise yourself as best as you can with the internals of the penetration testing distribution - and that's what this training is all about - turning you into a Kali Linux professional user. DOWNLOAD PDF -   https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf Learning how to master a kali gives you the freedom to create kali Linux  recipes like the Kali ISO of Doom, or the kali Evil Ap. you'll be able to build optimize and custom kali kernels, host them on your own repositories and create your own custom Kali Appliances - and there's so much more. After Reading This Book You Wil...