In recent months, there have been increasing attempts to spread malware via some seemingly ‘harmless’ programs, luring the user through rewards such as sending money with cryptocurrency or NFT-themed gifts. The unsuspecting user by running an ‘innocent’ executable to access prizes becomes part of a botnet. In this post, I would like to analyse in some detail the ‘Redline-EDIRA’ malware campaign that has been going on since around the beginning of May 2022. -| SerHack - Security Researcher
An attempt to reverse engineer the OMNIVISION OS12D40 user-space driver.| SerHack – Security Research
Learn about the hardware aspects for Programmed Input Output and Direct Memory Access.| SerHack – Security Research
Mastering Monero first edition has been released trough Amazon Store. Checkout it now!| SerHack – Security Research
Multiple cross-site scripting (XSS) vulnerabilities in includes/core/um-actions-login.php in the 'Ultimate Member - User Profile & Membership' plugin through 2.0.27 for WordPress.| SerHack – Security Research
Development of a keylogger following hardware and software techniques, introducing keyboard hooking.| SerHack – Security Research
Hello world, I am SerHack, I am a developer, a security researcher and writer, I mostly write about software backend and a security researcher. I am from Italy where the security of citizens data is not seen as a priority. When I started looking to the world of development, I was like 12 years old. During these days, I saw how a developer is able to do almost everything with a personal computer and then I started my adventure and my project for entire life: become an excellent developer!| SerHack – Security Research
The characteristics and details of the linux embedded firmware for Reolink RLC-810A.| SerHack – Security Research
In Part 3 of our series, we explored the hardware device elements of the Reolink RLC-810A ― focusing on the NAND memory. We continue with Part 4 of our exploration into an IP camera firmware through introducing the concept of a file system. Furthermore, we will explore the technical reasons for choosing the UBI File System (UBIFS), a file system used especially for a category of mass storage, and we will unpack the UBIFS part using the ubi-extract tool.| SerHack – Security Research
A detailed view of the hardware components inside a Reolink camera.| SerHack – Security Research
Discover the booting steps of an embedded operating system and the powerful Uboot bootloader.| SerHack – Security Research
Introduction to embedded devices, firmware of Reolink RLC 810A, and first steps with binwalk.| SerHack – Security Research
Discover the hidden story of the first genesis block of Bitcoin| SerHack – Security Research
Technical analysis of the popular ransomware Wannacry.| SerHack – Security Research
Reveal an anonymous author of a text using stylometry techniques.| SerHack – Security Research
See how I could perform an XSS Injection with Envato Search Field. SerHack Blog, a blog about security researcher, development and reverse engineering.| SerHack – Security Research
Let’s take a look at the Telugu symbol “jñā” that causes Apple software to crash.| SerHack – Security Research
The MoneroV coin is an impending unofficial fork of the Monero blockchain with many “red flag” characteristics that have alarmed the Monero community. Many users are wondering: could the MoneroV fork be a scam project?| SerHack – Security Research
Online compilers are a handy tool to save time and resources for coders, and are freely available for a variety of programming languages. But what's happen if they aren't built so secure?| SerHack – Security Research
Google Dorks: what they are and how they are used. Google often estimates more pages than another search engine in the field, with over billions of pages crawled| SerHack – Security Research
Over 50% of cyber attacks are executed through malware, whose job is to find a flaw to inject other types of viruses including malware, adware and much more. Knowing the computer remotely, it can spy on the screen and even crypt the files: a wrong click and you lose anything.| SerHack – Security Research
On 4 September at 14:30 UTC, an unknown attacker managed to hack into MEGA's Google Chrome web store account and upload a malicious version 3.39.4 of an extension to the web store, according to a blog post published by the company.| SerHack – Security Research
A new article written by SerHack about critical security issues found on the popular website Fontstruct.com.| SerHack – Security Research
I was surfing on Reddit quietly in a sunny day. I was busy since I had to work for many projects. At one point, I notice a new user thread asking if there ever was a MyMonero app for Android.| SerHack – Security Research
A new botnet malware has been captured through my honeypot. We analyze the malware with examples and using a simple language. Find out more at serhack.me| SerHack – Security Research
Recaping the history of Serhack website, highlighting new features and future posts.| SerHack – Security Research
Analysis of Monero CLI compromised binaries. Find out more at serhack.me| SerHack – Security Research
On a rainy autumn day, I was contacted like many users by a suspicious individual on Telegram. He insisted on asking for the help of the user who had to recover his wallet which contained several bitcoins. Our “friend”, hencereferred as “M.”, insisted that the user has to register on the platform to be able to unlock his wallet at the price of 0.3 BTC. At this point he invited the unsuspecting user to download a chrome extension and to sign up in a website.| SerHack – Security Research
Zoom is a service to host meetings without the need to install complicated applications: it is one of the many solutions for those who, during quarantine, want to keep in touch with people. But does it have any privacy or is it a myth?| SerHack – Security Research
Have you ever wondered which node consumes more resources? Managing a bespoke dashboard for your infrastructure. Learn how to create it.| SerHack – Security Research
Discover The Burner Address Technology and Enhance Your Privacy| SerHack – Security Research
An overview of Web Speech API and a discussion on its behavior in the context of phishing.| SerHack – Security Research
Dig in and understand how attackers performed a massive social engineering attack to Ledger users.| SerHack – Security Research
Learn how to use IRC through Convos, a modern self-hosted online client.| SerHack – Security Research
What to do if you are among the 270,000 users of Ledger's Data Breach.| SerHack – Security Research
Are you particularly well versed in a field? Why not write a book? I've summarized the 4 main steps to writing and publishing your first technical book.| SerHack – Security Research
Essential tips for discovering the emerging technology of blockchain and becoming your own bank.| SerHack – Security Research
Discover the various types of wallets for your crypto and choose the best option for you.| SerHack – Security Research
Einstein said time is relative, referring implicitly to computer as well. Uncover the concept of time, and learn about stopwatch and clock signal.| SerHack – Security Research
A deep dive into analysis of a malware spreaded through Facebook ads campaign.| SerHack – Security Research
Unpacking and reverse engineering of Bitmain AntMiner Z11 firmware.| SerHack – Security Research