Skip to content

Commit 386e195

Browse files
Null0RMclaude
andcommitted
Fix 3 bugs: date mismatch, duplicate kramdown key, placeholder description
- Fix date in AboutEtherHiding.md: 2025-12-09 → 2025-12-11 to match filename - Fix duplicate kramdown key in _config.yml that caused math_engine: mathjax to be silently overridden (MathJax was not rendering) - Replace default Chirpy placeholder description with blog-specific description Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent aeb8da3 commit 386e195

2 files changed

Lines changed: 3 additions & 5 deletions

File tree

_config.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ title: nullorm playground # the main title
1919
tagline: web3 / security # it will display as the subtitle
2020

2121
description: >- # used by seo meta and the atom feed
22-
A minimal, responsive and feature-rich Jekyll theme for technical writing.
22+
A technical blog covering Web3 security, blockchain internals, and CTF write-ups.
2323
2424
# Fill in the protocol & hostname for your site.
2525
# E.g. 'https://username.github.io', note that it does not end with a '/'.
@@ -153,13 +153,11 @@ paginate: 10
153153
baseurl: ""
154154

155155
markdown: kramdown
156-
kramdown:
157-
math_engine: mathjax
158-
159156

160157
# ------------ The following options are not recommended to be modified ------------------
161158

162159
kramdown:
160+
math_engine: mathjax
163161
footnote_backlink: "&#8617;&#xfe0e;"
164162
syntax_highlighter: rouge
165163
syntax_highlighter_opts: # Rouge Options › https://github.com/jneen/rouge#full-options

_posts/2025-12-11-AboutEtherHiding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Abusing Web3 - EtherHiding
3-
date: 2025-12-09 15:00:00 +0900
3+
date: 2025-12-11 15:00:00 +0900
44
---
55

66
예전에 ENKI에서 발간한 [EtherHiding](https://www.enki.co.kr/media-center/blog/analysis-of-the-clearfake-campaign-using-clickfix-and-etherhiding-techniques)기법에 관한 글을 읽은 적이 있었다. 그러다가 이번에 react에서 CVE 10.0점짜리 react2shell 취약점이 나오며 새롭게 등장한 [react2shell + etherHiding 기법을 합친 북한의 공격](https://www.sysdig.com/blog/etherrat-dprk-uses-novel-ethereum-implant-in-react2shell-attacks)에 대한 글을 읽고, ~~웹서비스보안쪽은 문외한이지만~~ 웹사이트 피싱 등 공격에 블록체인이 사용된다는 안타까움과 함께, 해당 공격 기법에 대해 간략하게나마 공부해보았다.

0 commit comments

Comments
 (0)