I got this particular error while trying to run Pelican to output HTML on the imported articles from Wordpress. | File "/usr/lib/python3.5/site-packages/markdown/extensions/attr_list.py", line 35, in _handle_double_quote | k, v = t.split(‘=’) | ValueError: too many values to unpack (expected 2) After some digging around, I found out that the problem is with the Markdown library used in Pelican. Specifically, in the attr_list extension. After careful examination, I found out that presence of \n characters in the inline attribute list produced by pandoc (which is used by pelican-import to convert HTML documents to markdown for editing) is responsible for the problem.
I recently updated my blog from Wordpress to Pelican. This is partly for a reason that my new VPS has a pretty low end configuration and I didn’t feel like installing PHP and then walk the whole deal. Time for trying out something new :) Enter Pelican. Written in Python and totally awesome! For the uninitiated, it is a static blog generator. You write the blog articles offline, and using Pelican you generate the entire blog as static HTML and then push it to your server for updating.
Today was an interesting day. We are setting up a honeypot in the campus and I was asked to check if all the ports in the honeypot VM are accessible from the pubilc internet. ####The Problem The setup is pretty simple. The honeypot is run in an VM behind the campus NAT. Any IP packet addressed to the public IP of our VM should be NATed properly, rewritten and sent to the private address of the VM.
Another easy stego challenge. The challenge consists of a HTML file. Opening it up, reveals that there is a table present. There were various cells present with nearly-same background color. Original file link here - glasses.tar.gz. A sample from the original HTML file. <td style="width: 7.75757575757576px; background-color: rgb(255, 255, 255);"></td> <td style="width: 7.75757575757576px; background-color: rgb(255, 255, 255);"></td> <td style="width: 7.75757575757576px; background-color: rgb(255, 255, 254);"></td> <td style="width: 7.75757575757576px; background-color: rgb(255, 255, 254);"></td> <td style="width: 7.
This was a easy one. We are required to find the flag in this image. This is the original image. Running file, shows nothing suspicious. stego_50.jpg: JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 430x425, frames 3 Running a binwalk, we can see that there is a ZIP archive appended to the end of the JPEG image. DECIMAL HEXADECIMAL DESCRIPTION ——————————————————————————– 0 0x0 JPEG image data, JFIF standard 1.