Remove handwritten {sub}titles Signed-off-by: Anirudh <icyph0x@pm.me>
Anirudh icyph0x@pm.me
Fri, 09 Aug 2019 01:19:47 +0530
9 files changed,
14 insertions(+),
33 deletions(-)
M
build/blog/fb50/index.html
→
build/blog/fb50/index.html
@@ -37,11 +37,9 @@ <body>
<div class="content"> <div align="left"> <p> 2019-08-05 </p> - <h1 id="picking-the-fb50-smart-lock-cve-2019-13143">Picking the FB50 smart lock (CVE-2019-13143)</h1> - -<h2 id="and-lessons-learnt-in-iot-security">… and lessons learnt in IoT security</h2> - -<p>(<em>originally posted at <a href="http://blog.securelayer7.net/fb50-smart-lock-vulnerability-disclosure">SecureLayer7’s Blog</a>, with my edits</em>)</p> + <h1> Picking the FB50 smart lock (CVE-2019-13143) </h1> + <h2> … and lessons learnt in IoT security </h2> + <p>(<em>originally posted at <a href="http://blog.securelayer7.net/fb50-smart-lock-vulnerability-disclosure">SecureLayer7’s Blog</a>, with my edits</em>)</p> <h3 id="the-lock">The lock</h3>
M
build/blog/my-setup/index.html
→
build/blog/my-setup/index.html
@@ -37,11 +37,9 @@ <body>
<div class="content"> <div align="left"> <p> 2019-05-13 </p> - <h1 id="my-setup">My Setup</h1> - -<h2 id="my-daily-drivers-hardware-and-software">My daily drivers — hardware and software</h2> - -<h3 id="hardware">Hardware</h3> + <h1> My Setup </h1> + <h2> My daily drivers — hardware, software and workflow </h2> + <h3 id="hardware">Hardware</h3> <p>The only computer I have with me is my <a href="https://store.hp.com/us/en/mdp/laptops/envy-13">HP Envy 13 (2018)</a> (my model looks a little different). It’s a 13” ultrabook, with an i5 8250u, 8 gigs of RAM and a 256 GB NVMe SSD. It’s a very comfy machine that does everything I need it to.</p>
M
build/blog/python-for-re-1/index.html
→
build/blog/python-for-re-1/index.html
@@ -37,11 +37,9 @@ <body>
<div class="content"> <div align="left"> <p> 2019-02-08 </p> - <h1 id="python-for-reverse-engineering-1-elf-binaries">Python for Reverse Engineering 1: ELF Binaries</h1> - -<h2 id="building-your-own-disassembly-tooling-for-thats-right-fun-and-profit">Building your own disassembly tooling for — that’s right — fun and profit</h2> - -<p>While solving complex reversing challenges, we often use established tools like radare2 or IDA for disassembling and debugging. But there are times when you need to dig in a little deeper and understand how things work under the hood.</p> + <h1> Python for Reverse Engineering #1: ELF Binaries </h1> + <h2> Building your own disassembly tooling for — that’s right — fun and profit </h2> + <p>While solving complex reversing challenges, we often use established tools like radare2 or IDA for disassembling and debugging. But there are times when you need to dig in a little deeper and understand how things work under the hood.</p> <p>Rolling your own disassembly scripts can be immensely helpful when it comes to automating certain processes, and eventually build your own homebrew reversing toolchain of sorts. At least, that’s what I’m attempting anyway.</p>
M
build/blog/rop-on-arm/index.html
→
build/blog/rop-on-arm/index.html
@@ -37,11 +37,9 @@ <body>
<div class="content"> <div align="left"> <p> 2019-06-06 </p> - <h1 id="return-oriented-programming-on-arm-32-bit">Return Oriented Programming on ARM (32-bit)</h1> - -<h2 id="making-stack-based-exploitation-great-again">Making stack-based exploitation great again!</h2> - -<p>Before we start <em>anything</em>, you’re expected to know the basics of ARM + <h1> Return Oriented Programming on ARM (32-bit) </h1> + <h2> Making stack-based exploitation great again! </h2> + <p>Before we start <em>anything</em>, you’re expected to know the basics of ARM assembly to follow along. I highly recommend <a href="https://twitter.com/fox0x01">Azeria’s</a> series on <a href="https://azeria-labs.com/writing-arm-assembly-part-1/">ARM Assembly Basics</a>. Once you’re
M
pages/blog/fb50.md
→
pages/blog/fb50.md
@@ -5,9 +5,6 @@ subtitle: … and lessons learnt in IoT security
date: 2019-08-05 --- -# Picking the FB50 smart lock (CVE-2019-13143) -## … and lessons learnt in IoT security - (*originally posted at [SecureLayer7's Blog](http://blog.securelayer7.net/fb50-smart-lock-vulnerability-disclosure), with my edits*) ### The lock
M
pages/blog/my-setup.md
→
pages/blog/my-setup.md
@@ -5,9 +5,6 @@ subtitle: My daily drivers — hardware, software and workflow
date: 2019-05-13 --- -# My Setup -## My daily drivers — hardware and software - ### Hardware The only computer I have with me is my [HP Envy 13 (2018)](https://store.hp.com/us/en/mdp/laptops/envy-13) (my model looks a little different). It’s a 13” ultrabook, with an i5 8250u,
M
pages/blog/python-for-re-1.md
→
pages/blog/python-for-re-1.md
@@ -5,10 +5,6 @@ subtitle: Building your own disassembly tooling for — that’s right — fun and profit
date: 2019-02-08 --- -# Python for Reverse Engineering 1: ELF Binaries - -## Building your own disassembly tooling for — that’s right — fun and profit - While solving complex reversing challenges, we often use established tools like radare2 or IDA for disassembling and debugging. But there are times when you need to dig in a little deeper and understand how things work under the hood. Rolling your own disassembly scripts can be immensely helpful when it comes to automating certain processes, and eventually build your own homebrew reversing toolchain of sorts. At least, that’s what I’m attempting anyway.
M
pages/blog/rop-on-arm.md
→
pages/blog/rop-on-arm.md
@@ -5,9 +5,6 @@ subtitle: Making stack-based exploitation great again!
date: 2019-06-06 --- -# Return Oriented Programming on ARM (32-bit) -## Making stack-based exploitation great again! - Before we start _anything_, you’re expected to know the basics of ARM assembly to follow along. I highly recommend [Azeria’s](https://twitter.com/fox0x01) series on [ARM Assembly
M
templates/text.html
→
templates/text.html
@@ -31,6 +31,8 @@ <body>
<div class="content"> <div align="left"> <p> {{ date }} </p> + <h1> {{ title }} </h1> + <h2> {{ subtitle }} </h2> {{ body }} </div> <hr />