<?xml version="1.0" encoding="utf-8" standalone="yes"?><?xml-stylesheet href="/rss.xsl" type="text/xsl"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SerHack - Security Researcher</title><link>https://serhack.me/</link><description>Recent content on SerHack - Security Researcher</description><generator>Olivetti-CMS</generator><language>en</language><atom:link href="https://serhack.me/index.xml" rel="self" type="application/rss+xml"/><item><title>Analysis of a Redline Based Malware</title><link>https://serhack.me/articles/analysis-redline-based-malware/</link><pubDate>Wed, 22 Mar 2023 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/analysis-redline-based-malware/</guid><description>In recent months, there have been increasing attempts to spread malware via some seemingly &amp;lsquo;harmless&amp;rsquo; programs, luring the user through rewards such as sending money with cryptocurrency or NFT-themed gifts. The unsuspecting user by running an &amp;lsquo;innocent&amp;rsquo; executable to access prizes becomes part of a botnet.
In this post, I would like to analyse in some detail the &amp;lsquo;Redline-EDIRA&amp;rsquo; malware campaign that has been going on since around the beginning of May 2022. -<a href="https://serhack.me/articles/analysis-redline-based-malware/">Continue to read the article on SerHack.me</a></description></item><item><title>Reverse Engineering the OMNIVISION OS12D40 Driver</title><link>https://serhack.me/articles/reverse-engineering-omnivision-os12d40-driver/</link><pubDate>Wed, 07 Dec 2022 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/reverse-engineering-omnivision-os12d40-driver/</guid><description>In Part 6 of our series, we structured a theoretical discussion regarding the devices, how they communicate, and the hardware elements that enable this.
Another very interesting folder that we come across during our investigation is /lib, which includes all the libraries for executables and device drivers developed by Novatek that allow the operating system to properly configure and set up all the hardware devices connected to the board. To begin, let&amp;rsquo;s introduce the topic by explaining what device drivers are and how they work on Linux-based systems. -<a href="https://serhack.me/articles/reverse-engineering-omnivision-os12d40-driver/">Continue to read the article on SerHack.me</a></description></item><item><title>Techniques for Setting up Peripherals via PIO and DMA</title><link>https://serhack.me/articles/techniques-setting-up-pheripherals-dma-pio/</link><pubDate>Wed, 30 Nov 2022 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/techniques-setting-up-pheripherals-dma-pio/</guid><description>In Part 5 of our series, we focused our efforts on understanding how the firmware was structured. In doing so, we analyzed the folder with the system executables and delved into the various configuration files.
Before tackling the analysis of a device driver, we need to focus on some hardware aspects that will come in handy for this article. These aspects include the management of peripherals and input/output devices. -<a href="https://serhack.me/articles/techniques-setting-up-pheripherals-dma-pio/">Continue to read the article on SerHack.me</a></description></item><item><title>Exploring the Operating System of Reolink RLC-810A</title><link>https://serhack.me/articles/operating-system-reolink-rlc-810-a/</link><pubDate>Wed, 23 Nov 2022 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/operating-system-reolink-rlc-810-a/</guid><description>In Part 4 of our series, we focused on the file system and before concluding, we were able to extract files from two UBIFS images contained within the firmware. Here in Part 5, we will try to better understand the structure of the root file system by introducing some basic concepts of the operating system used by Reolink RLC-810A, namely Linux.
Why Linux? Linux kernel is one of the most widely used operating systems in the world, if not the first by popularity. -<a href="https://serhack.me/articles/operating-system-reolink-rlc-810-a/">Continue to read the article on SerHack.me</a></description></item><item><title>Understanding the UBI File System in Embedded Devices</title><link>https://serhack.me/articles/understanding-ubi-file-system-embedded-devices-reolink/</link><pubDate>Wed, 16 Nov 2022 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/understanding-ubi-file-system-embedded-devices-reolink/</guid><description>In Part 3 of our series, we explored the hardware device elements of the Reolink RLC-810A ― focusing on the NAND memory. We continue with Part 4 of our exploration into an IP camera firmware through introducing the concept of a file system. Furthermore, we will explore the technical reasons for choosing the UBI File System (UBIFS), a file system used especially for a category of mass storage, and we will unpack the UBIFS part using the ubi-extract tool. -<a href="https://serhack.me/articles/understanding-ubi-file-system-embedded-devices-reolink/">Continue to read the article on SerHack.me</a></description></item><item><title>Dissecting Reolink RLC-810A Hardware: A Detailed View</title><link>https://serhack.me/articles/dissecting-reolink-rlc810a-hardware-detailed-view/</link><pubDate>Wed, 09 Nov 2022 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/dissecting-reolink-rlc810a-hardware-detailed-view/</guid><description>Now that we know how device booting works, let&amp;rsquo;s try to extract some parts from the firmware that we downloaded in Part 1 of our series. Here, we are interested in two main sections: the Linux kernel (which takes care of booting the device services) and the flattened device tree (which allows the kernel to know the hardware configuration a priori without inspecting each device).
During the course of this article, we will also proceed as hardware manufacturers and, with a critical eye, comment on each choice made by the manufacturer. -<a href="https://serhack.me/articles/dissecting-reolink-rlc810a-hardware-detailed-view/">Continue to read the article on SerHack.me</a></description></item><item><title>Booting an Embedded OS: the Booting and U-Boot Phase</title><link>https://serhack.me/articles/os-embedded-booting-phase-uboot/</link><pubDate>Wed, 02 Nov 2022 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/os-embedded-booting-phase-uboot/</guid><description>In the first post, we introduced embedded devices and started to scour through and extract information from Reolink IP camera firmware. At the end of the post, we ran Binwalk, which showed various types of files such as Flattened Device Tree, uImage Header, and UBI File System.
For the second article in this Reolink series, we are going to introduce the theory regarding the various stages of booting the operating system and explore the different types of files. -<a href="https://serhack.me/articles/os-embedded-booting-phase-uboot/">Continue to read the article on SerHack.me</a></description></item><item><title>Introduction to Firmware Analysis of a Reolink IP Camera</title><link>https://serhack.me/articles/introduction-firmware-analysis-ip-camera-reolink/</link><pubDate>Wed, 26 Oct 2022 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/introduction-firmware-analysis-ip-camera-reolink/</guid><description>Embedded devices continue to increase in popularity and one category, in particular, that has become en vogue as of late is the Internet of Things (IoT). The emergence of these next generation technologies has driven the home automation evolution from simple light bulbs to cloud-connected printers, smart refrigerators, etc.
However, this evolution has some disadvantages: The perennial need to be connected to the Internet and an increase in the potential attack surface. -<a href="https://serhack.me/articles/introduction-firmware-analysis-ip-camera-reolink/">Continue to read the article on SerHack.me</a></description></item><item><title>The Story Behind the Alternative Genesis Block of Bitcoin</title><link>https://serhack.me/articles/story-behind-alternative-genesis-block-bitcoin/</link><pubDate>Thu, 06 Oct 2022 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/story-behind-alternative-genesis-block-bitcoin/</guid><description>In this article, I attempt to explain the early source code of Bitcoin and make correlations with the source code currently in use. My intent is to help you better understand the early details regarding the history of Bitcoin and the enigmatic figure of Satoshi Nakamoto. As far as newcomers to Bitcoin or to the blockchain space are concerned, this may be a fairly complex article to understand as my target audience are average and more experienced users. -<a href="https://serhack.me/articles/story-behind-alternative-genesis-block-bitcoin/">Continue to read the article on SerHack.me</a></description></item><item><title>Unveiling the Anonymous Author: Stylometry Techniques</title><link>https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/</link><pubDate>Thu, 03 Mar 2022 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/</guid><description>One of the techniques that fascinates me most about writing is textual analysis, which includes semantics (the meaning of words) and syntax (the use of signs and letters to construct sentences).
Throughout history, both classical and modern, there are numerous examples of authors who wanted to keep their identity hidden. At a first glance, it might seem quite simple to create anonymity: You write the text and invent a name for an author. -<a href="https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/">Continue to read the article on SerHack.me</a></description></item><item><title>Analyzing the Mario Themed Malware</title><link>https://serhack.me/articles/analyzing-mario-malware-en/</link><pubDate>Fri, 01 Oct 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/analyzing-mario-malware-en/</guid><description>If you were a child with a Nintendo DS like myself, growing up you will undoubtedly have played (for countless hours) video games from the Mario series. Appearing for the first time in &amp;ldquo;Donkey Kong&amp;rdquo;, Mario is the undisputed protagonist of the video game brand of the Nintendo development house ― from sports to cars, most of the famous video games produced by Nintendo have Mario as the main character. -<a href="https://serhack.me/articles/analyzing-mario-malware-en/">Continue to read the article on SerHack.me</a></description></item><item><title>What is SerHack doing now?</title><link>https://serhack.me/now/</link><pubDate>Fri, 14 May 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/now/</guid><description>I am currently devoting day and night to pursuing a degree in Computer Science. If you are wondering about my projects, I am spending hours upon hours improving this blog, publishing an article about every month. Sometimes I devote myself to solving problems on Monero&amp;rsquo;s payment gateways.
What is this page? -<a href="https://serhack.me/now/">Continue to read the article on SerHack.me</a></description></item><item><title>How to Measure Execution Time of a Program</title><link>https://serhack.me/articles/measure-execution-time-program/</link><pubDate>Sat, 24 Apr 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/measure-execution-time-program/</guid><description>Measuring the performance of a program means keeping track of the consumption of resources used by the program.
In addition to simple technical performance, such as looking closely at RAM and CPU, it is useful to monitor the execution time of a certain task. Tasks such as increasing sorting of a set of values can take a long time depending on the algorithm used.
Before delving into optimizing an algorithm, it is useful to understand how to measure the execution time of a program. -<a href="https://serhack.me/articles/measure-execution-time-program/">Continue to read the article on SerHack.me</a></description></item><item><title>Assemble, Verify and Execute a Program</title><link>https://serhack.me/courses/asm/assemble-check-run-program-assembly/</link><pubDate>Mon, 05 Apr 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/courses/asm/assemble-check-run-program-assembly/</guid><description>Assembly program creation The process of creating an Assembly program goes through the following steps:
Writing one or more ASCII files (extension .s) containing the source program, using an ordinary text editor. Assembly of the source files, and generation of the object files (extension .o), using an assembler. Creation, of the executable file, via a linker. Verification of operation and correction of any errors, via a debugger. Assembler The Assembler transforms files containing the source program into as many object files containing machine language code. -<a href="https://serhack.me/courses/asm/assemble-check-run-program-assembly/">Continue to read the article on SerHack.me</a></description></item><item><title>An Introduction to Cryptocurrency Wallets: Which Wallet Type Suits You Best?</title><link>https://serhack.me/articles/introduction-cryptocurrency-wallets/</link><pubDate>Mon, 29 Mar 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/introduction-cryptocurrency-wallets/</guid><description>As the blockchain and digital asset ecosystem continues to blossom and produce revolutionary technologies that may potentially be the driving forces of the Fourth Industrial Revolution, newcomers to the space are considering what storage options are available for assets such as cryptocurrencies and crypto tokens.
Since the launch of Bitcoin in January 2009, we have seen an evolution in the functionality and security of different wallet types that have been brought to market over the years. -<a href="https://serhack.me/articles/introduction-cryptocurrency-wallets/">Continue to read the article on SerHack.me</a></description></item><item><title>Introduction to Assembly Language</title><link>https://serhack.me/courses/asm/introduction-assembly-language-first-part/</link><pubDate>Mon, 22 Mar 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/courses/asm/introduction-assembly-language-first-part/</guid><description>In the first part of this course, we are going to introduce some rudiments of Assembly, focusing on basic programming concepts and comparing compilation to assembly.
What is Assembly Language? Assembly language is a low-level programming language for a computer. A low-level programming language means that the instructions are basic and the computer can easily recognize what it is told to do. Using the assembler, assembly language can be converted to machine language, which is the lowest level language. -<a href="https://serhack.me/courses/asm/introduction-assembly-language-first-part/">Continue to read the article on SerHack.me</a></description></item><item><title>FAQ for Assembly course</title><link>https://serhack.me/courses/asm/faq/</link><pubDate>Sun, 21 Mar 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/courses/asm/faq/</guid><description>A collection of the most diverse questions I have received via email that might be helpful before tackling the course.
What knowledge is required? In order to face the course with serenity and not to go crazy at the first lines of code, it is necessary to have a basic knowledge of computer architecture (the basic components) and iterative programming. The notions will be covered as the reader gets deeper into the course; otherwise Google is your friend! -<a href="https://serhack.me/courses/asm/faq/">Continue to read the article on SerHack.me</a></description></item><item><title>Chapter 1: Introduction to Hugo</title><link>https://serhack.me/courses/gohugo/introduction-gohugo/</link><pubDate>Sun, 14 Mar 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/courses/gohugo/introduction-gohugo/</guid><description>In this first chapter we will begin to cover static, dynamic, and GoHugo sites. We will introduce the differences between the various technologies, and next we will explain what Hugo is.
Difference between dynamic and static sites Unlike dynamic sites, static sites have less or no dependence on databases, application servers and thus provides greater security, faster loading speed and better performance for end users. Maintaining and manually updating each page of a static site is cumbersome. -<a href="https://serhack.me/courses/gohugo/introduction-gohugo/">Continue to read the article on SerHack.me</a></description></item><item><title>Intel 80x86 Architecture</title><link>https://serhack.me/courses/asm/architecture-intel-80x86/</link><pubDate>Mon, 01 Mar 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/courses/asm/architecture-intel-80x86/</guid><description>Von Neumann architecture This basic model of a computer as a processing unit that receives input, communicates with a memory and produces output is known as the von Nuemann architecture named after the first computer scientist John von Neumann. In this architecture, the processor itself consists of several specialized parts:
The arithmetic logic unit (ALU)-the central processing unit capable of performing mathematical and logical operations.
The control unit that directs the movement of instructions in and out of the processor and sends control signals to the ALU so that it performs the correct operation at a given time. -<a href="https://serhack.me/courses/asm/architecture-intel-80x86/">Continue to read the article on SerHack.me</a></description></item><item><title>A Beginner’s Guide to Getting Started with Bitcoin</title><link>https://serhack.me/articles/getting-started-with-bitcoin/</link><pubDate>Wed, 10 Feb 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/getting-started-with-bitcoin/</guid><description>A man looks for Bitcoin Oasis
If you have heard about blockchain or cryptocurrency, then the term that initially comes to mind is Bitcoin. Launched 12 years ago, it was the late 2017 bull run that created a media frenzy that propelled Bitcoin into the mainstream and our modern day lexicon.
Often labeled as the “original” cryptocurrency, Bitcoin has been the catalyst (directly and/or indirectly) behind many new innovations in the blockchain and digital asset space, most notably Ethereum and Monero. -<a href="https://serhack.me/articles/getting-started-with-bitcoin/">Continue to read the article on SerHack.me</a></description></item><item><title>How to Write a Technical Book</title><link>https://serhack.me/articles/how-to-write-technical-book/</link><pubDate>Thu, 07 Jan 2021 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/how-to-write-technical-book/</guid><description>For some people, publishing a book represents a dream, or lifelong goal, whereby they share a particular experience or subject matter expertise.
In narrative books, behind every story, there is a moral that is often hidden and not always easy to understand. With more “technical” books, it is different ― as it goes beyond simply sharing. More specifically, writing a technical book means being a point of reference with regard to a particular topic. -<a href="https://serhack.me/articles/how-to-write-technical-book/">Continue to read the article on SerHack.me</a></description></item><item><title>How to React to the Ledger Data Breach: 5 Recommendations</title><link>https://serhack.me/articles/how-to-react-data-breach-ledger/</link><pubDate>Mon, 21 Dec 2020 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/how-to-react-data-breach-ledger/</guid><description>If you think you are amongst the users affected by the latest Ledger data breach, it is important not to panic! Follow a few simple steps and you can check the extent of the damage and keep an eye on the security of your account.
What are Data Breaches? One of the unfortunate side effects of the modern, Internet-connected world is the data breach ― an uncontrolled leak of data and/or information. -<a href="https://serhack.me/articles/how-to-react-data-breach-ledger/">Continue to read the article on SerHack.me</a></description></item><item><title>Convos: A Persistent Self-Hosted Web Client for IRC</title><link>https://serhack.me/articles/convos-web-client-persistent-irc/</link><pubDate>Fri, 18 Dec 2020 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/convos-web-client-persistent-irc/</guid><description>Throughout 2020, in large part due to the lockdown, many people have started to become familiar with internal communication tools. Microsoft Teams, Slack, Telegram, Mattermost, and a few others are the most widely used and recognizable of these tools, but there still seems to be some people using Internet Relay Chat (IRC) ― one of the first online messaging services.
Many of the widely used international communication tools have been inspired by IRC, which is gradually falling into disuse due to the modern UI and UX and additional features being offered by these more well-known messaging applications. -<a href="https://serhack.me/articles/convos-web-client-persistent-irc/">Continue to read the article on SerHack.me</a></description></item><item><title>A Practical Analysis of the Ledger Phishing Email</title><link>https://serhack.me/articles/practical-analysis-ledger-phishing-email/</link><pubDate>Mon, 02 Nov 2020 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/practical-analysis-ledger-phishing-email/</guid><description>Attempts at phishing and social engineering attacks have increased exponentially as of late, especially towards users who are active in the cryptocurrency space. Recently, there has been much discussion about a cunning attempt by phishers against Ledger and its users.
In this article, we&amp;rsquo;ll dissect:
How Ledger devices secure your Bitcoin and other cryptocurrencies What makes it, and other hardware wallets, vulnerable to phishing attacks Exactly how this phishing attack was executed, from spoofing the email to obtaining the assets The mechanisms attackers used to entice victims to install a fake client update How the client worked, from high-level concept to the internals of the Electron App What made it all possible: Where the attackers obtained the data, and the lackluster disclosure A note of caution: Never share the seed or private keys of your wallet! -<a href="https://serhack.me/articles/practical-analysis-ledger-phishing-email/">Continue to read the article on SerHack.me</a></description></item><item><title>Phishing: Persuading People through a Voice Synthesized by AI - Part 1</title><link>https://serhack.me/articles/persuading-people-through-voice-ai-phishing-part-1/</link><pubDate>Mon, 12 Oct 2020 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/persuading-people-through-voice-ai-phishing-part-1/</guid><description>I get between 10 to 20 emails per day and, usually, more than half of them are phishing attempts. Phishing attempts are a type of email scam that typically aims to obtain personal data of the victim, including username and password for email accounts and popular services (Gmail, Hotmail, mail.ru, Twitter, Amazon, etc.), through pages forged ad hoc to simulate login sections.
&amp;ldquo;Your account has been blocked for security checks. -<a href="https://serhack.me/articles/persuading-people-through-voice-ai-phishing-part-1/">Continue to read the article on SerHack.me</a></description></item><item><title>What is Stealth Address technology and Why Does Monero Use It?</title><link>https://serhack.me/articles/what-is-stealth-address-technology-monero/</link><pubDate>Wed, 16 Sep 2020 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/what-is-stealth-address-technology-monero/</guid><description>Monero Stealth Address
Monero is based on the CryptoNote protocol and utilizes the most powerful cryptographic techniques in an effort to protect the privacy of the sender, recipient, and obfuscate the amount transacted.
To protect the sender’s privacy, Ring Signatures has been implemented to prevent transaction inputs from being distinguishable from one another. Ring Confidential Transactions (RingCT), which hides transaction amounts, was implemented in block #1220516 during January 2017 and since September 2017, this feature became mandatory for all transactions on the Monero network. -<a href="https://serhack.me/articles/what-is-stealth-address-technology-monero/">Continue to read the article on SerHack.me</a></description></item><item><title>Monitoring Your Own Infrastructure Using Grafana, InfluxDB, and CollectD</title><link>https://serhack.me/articles/monitoring-infrastructure-grafana-influxdb-connectd/</link><pubDate>Tue, 21 Jul 2020 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/monitoring-infrastructure-grafana-influxdb-connectd/</guid><description>For some companies, infrastructure is the heart of its business. Specifically, I am referring to those companies which need to manage data and applications located on more than one server.
It is essential for a company to monitor its infrastructure nodes, especially if the company does not have on-site access to intervene when issues arise. In fact, the intensive use of some resources can be an indication of malfunctioning or overcrowding. -<a href="https://serhack.me/articles/monitoring-infrastructure-grafana-influxdb-connectd/">Continue to read the article on SerHack.me</a></description></item><item><title>Credits</title><link>https://serhack.me/credits/</link><pubDate>Fri, 24 Apr 2020 00:00:00 +0000</pubDate><guid>https://serhack.me/credits/</guid><description>This page was created to celebrate all the contributors and people who helped SerHack in the last few years. There are few people that incredibely helped me into creating, developing and working on the website.
Christoph Ono Christoph Ono is the designer behind my theme and my website. From fonts to colors, every single detail has been composed by him! He is a UX and digital product designer based in Munich, Germany. -<a href="https://serhack.me/credits/">Continue to read the article on SerHack.me</a></description></item><item><title>The Myth of Privacy and End-to-End Encryption in Zoom</title><link>https://serhack.me/articles/the-myth-privacy-end-to-end-encryption-zoom/</link><pubDate>Thu, 02 Apr 2020 22:00:00 +0000</pubDate><guid>https://serhack.me/articles/the-myth-privacy-end-to-end-encryption-zoom/</guid><description>Zoom is a service to host meetings without the need to install and configure complicated applications: it is one of the many solutions for those who, during quarantine, want to keep in touch with friends and relatives.
In this last period of lockdown, Zoom is becoming popular because of how simple it is to host meetings, without a complicated setup. You share a link, and all the participants are connected. -<a href="https://serhack.me/articles/the-myth-privacy-end-to-end-encryption-zoom/">Continue to read the article on SerHack.me</a></description></item><item><title>Take off the Infrastructure of a Scammer: Cryptonder and Torowallet</title><link>https://serhack.me/articles/app-cryptonder-another-scam-chrome-extension/</link><pubDate>Fri, 13 Dec 2019 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/app-cryptonder-another-scam-chrome-extension/</guid><description>On a rainy autumn day, I was contacted like many users by a suspicious individual on Telegram. He insisted on asking for the help of the user who had to recover his wallet which contained several bitcoins. Our &amp;ldquo;friend&amp;rdquo;, hencereferred as &amp;ldquo;M.&amp;rdquo;, insisted that the user has to register on the platform to be able to unlock his wallet at the price of 0.3 BTC.
At this point he invited the unsuspecting user to download a chrome extension and to sign up in a website. -<a href="https://serhack.me/articles/app-cryptonder-another-scam-chrome-extension/">Continue to read the article on SerHack.me</a></description></item><item><title>Monero Windows and Linux CLI Compromised: The Analysis of Binaries</title><link>https://serhack.me/articles/cli-binaries-compromised-monero-analysis/</link><pubDate>Wed, 20 Nov 2019 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/cli-binaries-compromised-monero-analysis/</guid><description>As mentioned in the getmonero.org blog post, the binaries of Command Line Interface (CLI) of Monero were recently compromised.
For readers who are unaware of Monero, it is a cryptocurrency which aims to protect the financial privacy of its users. It is based on well-known technologies such as ring signatures and Confidential Transactions; I suggest reading Mastering Monero to better understand its fundamentals.
Before starting my post-mortem analysis, I’d like to highlight that - at the moment of writing - I have no idea of HOW the downloads. -<a href="https://serhack.me/articles/cli-binaries-compromised-monero-analysis/">Continue to read the article on SerHack.me</a></description></item><item><title>Introducing the New Website: From WordPress to Gohugo</title><link>https://serhack.me/articles/introducing-the-new-website/</link><pubDate>Sat, 02 Nov 2019 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/introducing-the-new-website/</guid><description>At the beginning, I started my website on 14th May of 2017 when the recent Wannacry malware has appeared. My first post, in fact, was to discuss and to analyze the malware in deeper, explaining technical concepts to people who do not know anything about Windows and SMB.
In my life, I meet some people who costantely marked theirself as &amp;ldquo;expert&amp;rdquo; in Computer science, but after I have asked them some basic questions, I understood that it was a lie. -<a href="https://serhack.me/articles/introducing-the-new-website/">Continue to read the article on SerHack.me</a></description></item><item><title>Unpacking ASIC firmware: AntMiner Exploited</title><link>https://serhack.me/articles/unpacking-asic-firmware-antminer-exploited/</link><pubDate>Sat, 18 May 2019 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/unpacking-asic-firmware-antminer-exploited/</guid><description>Introduction Experts say cryptocurrencies (such as Bitcoin, Monero, and Ethereum) will be the protagonists of the future decentralized and distributed economic system. If this is true then one of the most debated topics in the field of cryptocurrency, how to verify payments while spending as little as possible in terms of resources, is especially important for cryptosecurity.
There are many verification methods. “Proof of Work” is an easy verification method to execute yet it’s extremely difficult to create. -<a href="https://serhack.me/articles/unpacking-asic-firmware-antminer-exploited/">Continue to read the article on SerHack.me</a></description></item><item><title>Privacy Policy</title><link>https://serhack.me/privacy/</link><pubDate>Sun, 21 Apr 2019 00:00:00 +0000</pubDate><guid>https://serhack.me/privacy/</guid><description>Questo sito non utilizza alcun script per ottenere informazioni riguardo gli utenti che visitano SerHack.me. Cloudflare potrebbe utilizzare alcune informazioni riguardo la vostra connessione e ogni visita potrebbe essere loggata dal vostro ISP.
This website does not use any scripts to obtain precious informations from the users that read the articles. However, Cloudflare might use some of your informations and every connection might be logged with your ISP too. Consider using VPN or visiting TOR blog. -<a href="https://serhack.me/privacy/">Continue to read the article on SerHack.me</a></description></item><item><title>Botnet analysis based on IRC network</title><link>https://serhack.me/articles/malware-botnet-irc-analysis/</link><pubDate>Mon, 18 Feb 2019 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/malware-botnet-irc-analysis/</guid><description>With one of my many honeypots actived around the world wide web, I discovered an interesting script written with the famous Perl programming language. This Perl script is a malware used to remotely control a machine, opening what is technically called backdoor. If this malicious program runs on multiple machines, there is a possibility that the attacker may have created a botnet.
At first, a botnet is a network controlled by a bots master and composed of devices infected with specialized malware, called bots or zombies (&amp;ldquo;Computer zombie&amp;rdquo;). -<a href="https://serhack.me/articles/malware-botnet-irc-analysis/">Continue to read the article on SerHack.me</a></description></item><item><title>MyMonero Phishing – Reversing the fake Android app</title><link>https://serhack.me/articles/phishing-mymonero-app-android-fake/</link><pubDate>Fri, 04 Jan 2019 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/phishing-mymonero-app-android-fake/</guid><description>I was surfing on Reddit quietly in a sunny day. I was busy since I had to work for many projects including Mastering Monero. At one point, I notice a new user thread asking if there ever was a MyMonero app for Android.
First of all, MyMonero is a private business founded by fluffypony who is the lead mantainer of Monero cryptocurrency. At the moment, this service is managed by Paul Shapiro who is the official iOS developer and CEO. -<a href="https://serhack.me/articles/phishing-mymonero-app-android-fake/">Continue to read the article on SerHack.me</a></description></item><item><title>Mastering Monero first edition has been released</title><link>https://serhack.me/articles/mastering-monero-first-edition-has-been-released/</link><pubDate>Fri, 21 Dec 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/mastering-monero-first-edition-has-been-released/</guid><description>&amp;ldquo;Mastering Monero: The future of private transactions&amp;rdquo; is your guide through the world of Monero, a leading cryptocurrency with a focus on private and censorship-resistant transactions. This book contains everything you need to know to start using Monero in your business or day-to-day life, even if you&amp;rsquo;ve never understood or interacted with cryptocurrencies before.
Cryptocurrencies have revolutionized the financial landscape by allowing anybody with an internet connection to instantly access secure, robust, censorship-free systems for receiving, storing, and sending funds. -<a href="https://serhack.me/articles/mastering-monero-first-edition-has-been-released/">Continue to read the article on SerHack.me</a></description></item><item><title>Mastering Monero</title><link>https://serhack.me/books/mastering-monero/</link><pubDate>Thu, 20 Dec 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/books/mastering-monero/</guid><description>Book overview Across these eight chapters, “Mastering Monero” can take a reader from a complete crypto novice to an informed crypto citizen that knows how to protect his or her privacy. This book takes you by the hand on an exploratory adventure, showing you the world of blockchains and crypto, before taking you on a private tour of the Monero protocol and systems.
Illustrations throughout the chapters make it easy for readers to understand the content visually. -<a href="https://serhack.me/books/mastering-monero/">Continue to read the article on SerHack.me</a></description></item><item><title>Ultimate Member User Profile &amp; Membership Plugin STORED XSS</title><link>https://serhack.me/articles/ultimate-member-xss-security-issue/</link><pubDate>Sat, 06 Oct 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/ultimate-member-xss-security-issue/</guid><description>Product: Ultimate Member – User Profile &amp;amp; Membership Plugin
Version: 2.0.27 or earlier
URL: https://wordpress.org/plugins/ultimate-member/
Potential users affected: 100.000+
CVE : CVE-2018-17866
Ultimate member Ultimate Member is one of the many user profile &amp;amp; membership plugins for WordPress. The plugin makes it a breeze for users to sign-up and become members of your website. The plugin allows you to add user profiles to your site and is suitable for creating advanced online communities and membership sites. -<a href="https://serhack.me/articles/ultimate-member-xss-security-issue/">Continue to read the article on SerHack.me</a></description></item><item><title>FontStruct - Break the Font InfraSTRUCTure!</title><link>https://serhack.me/articles/fontstruct-xss-break-the-font-en/</link><pubDate>Sun, 30 Sep 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/fontstruct-xss-break-the-font-en/</guid><description>The website FontStruct allows even novice users to create their own personal font from scratch. A very simplified procedure: you sign up and you are ready to compose your font. Everything is offered through a simple interface as a free service. Not bad for a free service!
Unfortunately, the developer who set up this service has not thought very well about security, repeatedly implementing stratagems that only work for some specific cases. -<a href="https://serhack.me/articles/fontstruct-xss-break-the-font-en/">Continue to read the article on SerHack.me</a></description></item><item><title>MEGA Chrome Extension Hacked - Detailed Timeline of Events</title><link>https://serhack.me/articles/mega-chrome-extension-hacked/</link><pubDate>Tue, 04 Sep 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/mega-chrome-extension-hacked/</guid><description>TLDR; On 4 September at 14:30 UTC, an unknown attacker managed to hack into MEGA&amp;rsquo;s Google Chrome web store account and upload a malicious version 3.39.4 of an extension to the web store, according to a blog post published by the company. Upon installation or auto-update, the malicious extension asked for elevated permissions to access personal information, allowing it to steal login/register credentials from ANY websites like Amazon, Github, and Google, along with online wallets such as MyEtherWallet and MyMonero, and Idex. -<a href="https://serhack.me/articles/mega-chrome-extension-hacked/">Continue to read the article on SerHack.me</a></description></item><item><title>Deobfuscation and Understanding a Trojan Jscript</title><link>https://serhack.me/articles/deobfuscate-understand-trojan-jscript-en/</link><pubDate>Wed, 06 Jun 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/deobfuscate-understand-trojan-jscript-en/</guid><description>Over 50% of cyber attacks are executed through malware, whose job is to find a flaw to inject other types of viruses including malware, adware and much more. Knowing the computer remotely, it can spy on the screen and even crypt the files: a wrong click and you lose anything.
It is estimated that more than 100 malicious programs are built every week; there are companies that develop protections and security systems for this type of attack. -<a href="https://serhack.me/articles/deobfuscate-understand-trojan-jscript-en/">Continue to read the article on SerHack.me</a></description></item><item><title>Google Dorks: The Powerup for the Search Engine</title><link>https://serhack.me/articles/google-dorks-how-hacking/</link><pubDate>Wed, 16 May 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/google-dorks-how-hacking/</guid><description>It is estimated that Google has downloaded more pages than any other search engine in the field. With over billions of pages and a relatively low execution time, the popular Californian search engine is able to satisfy all research, both for educational purposes and for purely curiosity purposes.
The search engine is so powerful that it can categorize more than 15 million pages in less than a minute. But it was not always like this: in 1999 it took more than a month for such operation. -<a href="https://serhack.me/articles/google-dorks-how-hacking/">Continue to read the article on SerHack.me</a></description></item><item><title>Hackers Can Take Full Control of Online Compilers through a Common Exploit</title><link>https://serhack.me/articles/hackers-full-control-of-online-compilers-through-a-common-exploit/</link><pubDate>Wed, 18 Apr 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/hackers-full-control-of-online-compilers-through-a-common-exploit/</guid><description>Online compilers are a handy tool to save time and resources for coders, and are freely available for a variety of programming languages. They are useful for learning a new language and developing simple programs, such as the ubiquitous “Hello World” exercise. I often use online compilers when I am out, so that I don’t have to worry about locating and downloading all of the resources myself.
Since these online tools are essentially remote compilers with a web interface, I realized that I might be able to take remote control of the machines through command injection. -<a href="https://serhack.me/articles/hackers-full-control-of-online-compilers-through-a-common-exploit/">Continue to read the article on SerHack.me</a></description></item><item><title>Introduction to MoneroV and its Inherent Risks</title><link>https://serhack.me/articles/introduction-to-monerov-and-its-inherent-risks/</link><pubDate>Tue, 06 Mar 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/introduction-to-monerov-and-its-inherent-risks/</guid><description>The “MoneroV” coin is an impending unofficial fork of the Monero blockchain with many “red flag” characteristics that have alarmed the Monero community. Many users are wondering: could the MoneroV fork be a scam project? This article discusses risks for individuals claiming MoneroV, and describes how MoneroV opens an attack vector on the overall privacy of the Monero network itself.
Types of cryptocurrency forks The word “fork” is an umbrella term that describes several distinct processes the cryptocurrency world, each with different goals and consequences. -<a href="https://serhack.me/articles/introduction-to-monerov-and-its-inherent-risks/">Continue to read the article on SerHack.me</a></description></item><item><title>How to Crash the iPhone with a Single Telugu Character</title><link>https://serhack.me/articles/crash-iphone-telugu-character-en/</link><pubDate>Tue, 20 Feb 2018 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/crash-iphone-telugu-character-en/</guid><description>In recent years, Apple has been heavily criticized for the security implications of their market centralization and policy of irreversible operating system updates. Mobile device users are strongly pressured to install packaged iOS upgrades that cannot be rolled back. While this practice greatly increases security for most users, there is an inherent danger to this centralization.
Every flaw or weakness leaves over 100 million Apple device users vulnerable to exploitation for illegal purposes. -<a href="https://serhack.me/articles/crash-iphone-telugu-character-en/">Continue to read the article on SerHack.me</a></description></item><item><title>How I broke Envato Search Engine</title><link>https://serhack.me/articles/how-i-broke-envato-search-field/</link><pubDate>Thu, 05 Oct 2017 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/how-i-broke-envato-search-field/</guid><description>How Envato managed two critical vulnerabilities discovered by me TLDR; Envato devs had not developed a strong filter in order to avoid any XSS Attack, and I noticed that I could perform a XSS Injection. I have contacted Envato and, after some investigations, they have discovered that my vulnerabilities were critical! They thanked me and patched the vulnerabilities within 5 business days. Good job Envato!!
How everything started Presently I am an Envato Author, web developer, and a security researcher. -<a href="https://serhack.me/articles/how-i-broke-envato-search-field/">Continue to read the article on SerHack.me</a></description></item><item><title>Developing a Keylogger: Hardware vs. Software Techniques</title><link>https://serhack.me/articles/development-keylogger-techniques-hardware-software/</link><pubDate>Fri, 26 May 2017 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/development-keylogger-techniques-hardware-software/</guid><description>To celebrate 400+ visits to my blog after just 10 days (not bad, come on), I managed in my spare time to write another, very interesting article on another popular category of malware: keyloggers.
Keyloggers are a particularly insidious form of malware: they are software designed to monitor every key pressed on the keyboard of any device.
Unlike other malicious programs, therefore, they do not pose a danger to the system per se, but they can become a treacherous source of threat to users, since they can be used to intercept passwords, PINs, account numbers, and confidential information. -<a href="https://serhack.me/articles/development-keylogger-techniques-hardware-software/">Continue to read the article on SerHack.me</a></description></item><item><title>Technical Analysis of WannaCry Ransomware</title><link>https://serhack.me/articles/technical-analysis-ransomware-wannacry/</link><pubDate>Wed, 17 May 2017 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/technical-analysis-ransomware-wannacry/</guid><description>By now, on the net, on TV and around the world, there is nothing but talk about WannaCrypt: ransomware, or malware that can encrypt all the files on one&amp;rsquo;s computer and demand a ransom for unlocking them.
It has infected between 500,000 and 600,000 computers in more than half the world. Attacked hospitals, businesses, in short general panic. You probably already know the story, that&amp;rsquo;s all people are talking about. -<a href="https://serhack.me/articles/technical-analysis-ransomware-wannacry/">Continue to read the article on SerHack.me</a></description></item><item><title>Hello world! I'm SerHack</title><link>https://serhack.me/articles/hello-world/</link><pubDate>Mon, 15 May 2017 00:00:00 +0000</pubDate><guid>https://serhack.me/articles/hello-world/</guid><description>Hello world, I am SerHack, I am a developer, a security researcher and writer, I mostly write about software backend and a security researcher. I am from Italy where the security of citizens data is not seen as a priority. When I started looking to the world of development, I was like 12 years old.
During these days, I saw how a developer is able to do almost everything with a personal computer and then I started my adventure and my project for entire life: become an excellent developer! -<a href="https://serhack.me/articles/hello-world/">Continue to read the article on SerHack.me</a></description></item><item><title>About Me</title><link>https://serhack.me/about/</link><pubDate>Sun, 14 May 2017 00:00:00 +0000</pubDate><guid>https://serhack.me/about/</guid><description>Despite his nickname, SerHack is not an hacker.
SerHack (SeərHæck) is a security researcher, developer, and writer. He started his career with development of payment gateways for a popular cryptocurrency. Since then he has reported several bugs and security issues, many of them CVE. He is widely known for reporting the MEGA incident and conducts different malware analyses. Additionally, SerHack contributes to the Monero project – a cryptocurrency focused on privacy. -<a href="https://serhack.me/about/">Continue to read the article on SerHack.me</a></description></item><item><title>Donate to SerHack</title><link>https://serhack.me/donate/</link><pubDate>Sun, 14 May 2017 00:00:00 +0000</pubDate><guid>https://serhack.me/donate/</guid><description>This page is for people who like my work and would like to boost my projects. At the moment, I&amp;rsquo;m writing the second edition of &amp;ldquo;Mastering Monero&amp;rdquo; and a new resource named &amp;ldquo;Breaking Cryptocurrencies&amp;rdquo;.
I have several ideas in my mind that needs funding, so please don&amp;rsquo;t hesitate to contact me for more information. Thanks to your support, I&amp;rsquo;ve been able to realize this blog and the books I&amp;rsquo;ve mentioned earlier. -<a href="https://serhack.me/donate/">Continue to read the article on SerHack.me</a></description></item></channel></rss>