All Articles

Started to be written in 2017, SerHack Blog represents a solid but unique point of view in Computer Science field. From cryptocurrencies to information security, from reverse engineering to phishing: many topics are depicted using layman terms. What are you waiting for? Read one of any articles.

Olivetti 0.112.6 for SerHack

Analysis of a Redline Based Malware

– In recent months, there have been increasing attempts to spread malware via some seemingly ‘harmless’ programs, luring the user through rewards such as sending money with cryptocurrency or NFT-themed gifts. The unsuspecting user by running an ‘innocent’ executable to access … See Full Article

Analysis of a Redline Based Malware Illustration

Reverse Engineering the OMNIVISION OS12D40 Driver

– In Part 6 of our series, we structured a theoretical discussion regarding the devices, how they communicate, and the hardware elements that enable this. Another very interesting folder that we come across during our investigation is /lib, which includes all the libraries for executables and device … See Full Article

Reverse Engineering the OMNIVISION OS12D40 Driver Illustration

Techniques for Setting up Peripherals via PIO and DMA

– In Part 5 of our series, we focused our efforts on understanding how the firmware was structured. In doing so, we analyzed the folder with the system executables and delved into the various configuration files. Before tackling the analysis of a device driver, we need to focus on some hardware … See Full Article

Techniques for Setting up Peripherals via PIO and DMA Illustration

Exploring the Operating System of Reolink RLC-810A

– In Part 4 of our series, we focused on the file system and before concluding, we were able to extract files from two UBIFS images contained within the firmware. Here in Part 5, we will try to better understand the structure of the root file system by introducing some basic concepts of the operating … See Full Article

Exploring the Operating System of Reolink RLC-810A Illustration

Understanding the UBI File System in Embedded Devices

– In Part 3 of our series, we explored the hardware device elements of the Reolink RLC-810A ― focusing on the NAND memory. We continue with Part 4 of our exploration into an IP camera firmware through introducing the concept of a file system. Furthermore, we will explore the technical reasons for … See Full Article

Understanding the UBI File System in Embedded Devices Illustration
All tags