diff --git a/content/from-0-to-buffer-overflow-by-projects/episode-2-reverse-engineering-of-vigenere-cisco(reverse-engineering)-program.md b/content/from-0-to-buffer-overflow-by-projects/episode-2-guessing-source-code-(reverse-engineering)-program.md similarity index 99% rename from content/from-0-to-buffer-overflow-by-projects/episode-2-reverse-engineering-of-vigenere-cisco(reverse-engineering)-program.md rename to content/from-0-to-buffer-overflow-by-projects/episode-2-guessing-source-code-(reverse-engineering)-program.md index 8bc743d..179f22c 100644 --- a/content/from-0-to-buffer-overflow-by-projects/episode-2-reverse-engineering-of-vigenere-cisco(reverse-engineering)-program.md +++ b/content/from-0-to-buffer-overflow-by-projects/episode-2-guessing-source-code-(reverse-engineering)-program.md @@ -35,16 +35,6 @@ $ which packettracer /usr/local/bin/packettracer ``` - -In order to redo same commands as me you could also download it from my repository - -``` -wget https://github.com/gogo2464/packet-tracer-linux-8.2.1.0118-archive/releases/edit/untagged-4b7b9f96a74e3408a5b2 -cd packet-tracer-linux-8.2.1.0118-disassembly -sudo apt-get install --reinstall libxcb-xinerama0 --yes -``` - - Find the file `PacketTracer` with: `ls /opt/pt/bin`. The file `packettracer` provides running commands: @@ -94,6 +84,14 @@ Router# In any cisco router you could run as well. It fits with the output of the program. +In order to redo same commands as me you could also download it from my repository + +``` +wget https://github.com/gogo2464/packet-tracer-linux-8.2.1.0118-archive/releases/download/packet-tracer-linux-8.2.1.0118/pt.tar +tar -xvf pt.tar +cd pt.tar +cd pt +``` ### 2.1: static analysis: looking for symbols (exercice) diff --git a/content/from-0-to-crypto-by-projects/episode-2-proof-demonstration.md b/content/from-0-to-crypto-by-projects/episode-2-proof-demonstration.md index 13f9236..dda1cda 100644 --- a/content/from-0-to-crypto-by-projects/episode-2-proof-demonstration.md +++ b/content/from-0-to-crypto-by-projects/episode-2-proof-demonstration.md @@ -9,7 +9,7 @@ draft: false According to the documentation and as it is mentionned that type 7 is an hashing algorithm. -A secure hash algorithm is an hash algorithm so that there does not exist a function `$$ f(enc) $$` so that `$$ f(enc) = original_plaintext $$`. +A secure hash algorithm is an hash algorithm so that there does not exist a function $ f(enc) $ so that $ f(enc) = original-plaintext $. ## 1 - Analysis under mathematical thinking diff --git a/themes/hello-4s3ti/layouts/_default/baseof.html b/themes/hello-4s3ti/layouts/_default/baseof.html index 399a30b..ff3d164 100644 --- a/themes/hello-4s3ti/layouts/_default/baseof.html +++ b/themes/hello-4s3ti/layouts/_default/baseof.html @@ -9,7 +9,7 @@ {{ end }} - + diff --git a/themes/hello-4s3ti/layouts/partials/head.html b/themes/hello-4s3ti/layouts/partials/head.html index b53c9f7..0677ac1 100644 --- a/themes/hello-4s3ti/layouts/partials/head.html +++ b/themes/hello-4s3ti/layouts/partials/head.html @@ -96,3 +96,20 @@ {{- if .Site.Config.Services.GoogleAnalytics.ID }} {{ template "_internal/google_analytics.html" . }} {{- end}} + + + + + + + + + \ No newline at end of file