ooh.directory
Visit this blog serhack.me
Security engineer and writer. Author of Mastering Monero, enthusiastic about blockchain technology and privacy application.
Any gaps could be due to errors when fetching the blog’s feed.
In recent months, there have been increasing attempts to spread malware via some seemingly ‘harmless’ programs, luring the user through rewards such as sending money with cryptocurrency or NFT-themed gifts. The unsuspecting user by running …
In Part 6 of our series, we structured a theoretical discussion regarding the devices, how they communicate, and the hardware elements that enable this. Another very interesting folder that we come across during our investigation …
In Part 5 of our series, we focused our efforts on understanding how the firmware was structured. In doing so, we analyzed the folder with the system executables and delved into the various configuration files. …