SerHack - Developer and Security

Developer - Security engineer

[email protected]

Blog

2019-01-04

MyMonero Phishing - Reversing the fake app

I was surfing on Reddit quietly in a sunny day. I was busy since I had to work for many projects including Mastering Monero. At one point, I notice a new user thread asking if there ever was a MyMonero app for Android.

2018-12-21

Mastering Monero paperback has been released!

"Mastering Monero: The future of private transactions" is your guide through the world of Monero, a leading cryptocurrency with a focus on private and censorship-resistant transactions. This book contains everything you need to know to start using Monero in your business or day-to-day life, even if you've never understood or interacted with cryptocurrencies before.

2018-10-06

Ultimate Member – User Profile & Membership Plugin STORED XSS

Security

CVE-2018-17866 / Multiple cross-site scripting (XSS) vulnerabilities in includes/core/um-actions-login.php in the "Ultimate Member - User Profile & Membership" plugin through 2.0.27 for WordPress allow remote attackers to inject arbitrary web script or HTML via the "Primary button Text" or "Second button text" field.

2018-09-30

FontStruct - Break the Font InfraSTRUCTure

Security

I discovered some critial security issues on the popular website fontstruct.com

2018-09-04

MEGA Chrome Extension Hacked - Detailed Timelaps

Security Trojan

On 4 September at 14:30 UTC, an unknown attacker managed to hack into MEGA's Google Chrome web store account and upload a malicious version 3.39.4 of an extension to the web store, according to a blog post published by the company.

2018-06-06

Deobfuscating and Understanding a Trojan JScript

Jscript Trojan

Over 50% of cyber attacks are executed through malware, whose job is to find a flaw to inject other types of viruses including malware, adware and much more. Knowing the computer remotely, it can spy on the screen and even crypt the files: a wrong click and you lose anything.

2018-05-16

Understanding Google Dorks and How Hackers Use Them

Search Engine Dorks

It is estimated that Google has downloaded more pages than any other search engine in the market. With over billions of pages and a relatively low execution time, the popular Californian search engine is able to satisfy all research, both for educational purposes and for purely curiosity purposes.

2018-04-18

Security research report: Hackers can take full control of online compilers through a common exploit

Security Shell injection

Online compilers are a handy tool to save time and resources for coders, and are freely available for a variety of programming languages. Since these online tools are essentially remote compilers with a web interface, I realized that I might be able to take remote control of the machines through command injection.