All Articles - Page 4

Started to be written in 2017, SerHack Blog represents a solid but unique point of view in Computer Science field. From cryptocurrencies to information security, from reverse engineering to phishing: many topics are depicted using layman terms. What are you waiting for? Read one of any articles.

Olivetti 0.101.0 for SerHack

FontStruct - Break the Font InfraSTRUCTure!

– The website FontStruct allows even novice users to create their own personal font from scratch. A very simplified procedure: you sign up and you are ready to compose your font. Everything is offered through a simple interface as a free service. Not bad for a free service! See Full Article

FontStruct - Break the Font InfraSTRUCTure! Illustration

MEGA Chrome Extension Hacked - Detailed Timeline of Events

– On 4 September at 14:30 UTC, an unknown attacker managed to hack into MEGA’s Google Chrome web store account and upload a malicious version 3.39.4 of an extension to the web store, according to a blog post published by the company. Upon installation or auto-update, the malicious extension … See Full Article

MEGA Chrome Extension Hacked - Detailed Timeline of Events Illustration

Deobfuscation and Understanding a Trojan Jscript

– Over 50% of cyber attacks are executed through malware, whose job is to find a flaw to inject other types of viruses including malware, adware and much more. Knowing the computer remotely, it can spy on the screen and even crypt the files: a wrong click and you lose anything. See Full Article

Deobfuscation and Understanding a Trojan Jscript Illustration

Google Dorks: The Powerup for the Search Engine

– It is estimated that Google has downloaded more pages than any other search engine in the field. With over billions of pages and a relatively low execution time, the popular Californian search engine is able to satisfy all research, both for educational purposes and for purely curiosity purposes. See Full Article

Google Dorks: The Powerup for the Search Engine Illustration

Hackers Can Take Full Control of Online Compilers through a Common Exploit

– Online compilers are a handy tool to save time and resources for coders, and are freely available for a variety of programming languages. They are useful for learning a new language and developing simple programs, such as the ubiquitous “Hello World” exercise. I often use online compilers when I am … See Full Article

Hackers Can Take Full Control of Online Compilers through a Common Exploit Illustration

Introduction to MoneroV and its Inherent Risks

– The “MoneroV” coin is an impending unofficial fork of the Monero blockchain with many “red flag” characteristics that have alarmed the Monero community. Many users are wondering: could the MoneroV fork be a scam project? This article discusses risks for individuals claiming MoneroV, and describes … See Full Article

Introduction to MoneroV and its Inherent Risks Illustration

How to Crash the iPhone with a Single Telugu Character

– In recent years, Apple has been heavily criticized for the security implications of their market centralization and policy of irreversible operating system updates. Mobile device users are strongly pressured to install packaged iOS upgrades that cannot be rolled back. While this practice greatly … See Full Article

How to Crash the iPhone with a Single Telugu Character Illustration

How I broke Envato Search Engine

– Envato devs had not developed a strong filter in order to avoid any XSS Attack, and I noticed that I could perform a XSS Injection. I have contacted Envato and, after some investigations, they have discovered that my vulnerabilities were critical! They thanked me and patched the vulnerabilities … See Full Article

How I broke Envato Search Engine Illustration

Developing a Keylogger: Hardware vs. Software Techniques

– To celebrate 400+ visits to my blog after just 10 days (not bad, come on), I managed in my spare time to write another, very interesting article on another popular category of malware: keyloggers. See Full Article

Developing a Keylogger: Hardware vs. Software Techniques Illustration

Technical Analysis of WannaCry Ransomware

– By now, on the net, on TV and around the world, there is nothing but talk about WannaCrypt: ransomware, or malware that can encrypt all the files on one’s computer and demand a ransom for unlocking them. See Full Article

Technical Analysis of WannaCry Ransomware Illustration
All tags