diff --git a/content/blog/dockerized-onion-service.md b/content/blog/dockerized-onion-service.md
index 9af4d72..18ad391 100644
--- a/content/blog/dockerized-onion-service.md
+++ b/content/blog/dockerized-onion-service.md
@@ -40,13 +40,22 @@ services:
nginx:
image: nginx:latest
container_name: nginx-onion
- command:
+ command:
volumes:
- ./web/config/onion-default.conf:/etc/nginx/conf.d/default.conf:rw
- ./web/public:/usr/share/nginx/html:ro
- nginx-tor-socket:/var/run/onion-sockets:rw
healthcheck:
- test: ["CMD", "curl", "-f", "--unix-socket", "/var/run/onion-sockets/site.sock", "||", "exit 1"]
+ test:
+ [
+ "CMD",
+ "curl",
+ "-f",
+ "--unix-socket",
+ "/var/run/onion-sockets/site.sock",
+ "||",
+ "exit 1",
+ ]
interval: 10s
timeout: 5s
retries: 5
@@ -126,7 +135,10 @@ add_header Onion-Location http://golfed6fzytoktol4de4o4nerap3xuykhfm5makfzscib65
Or alternatively include an HTML `` attribute:
```html
-
+
```
Notably, with proxying enabled through Cloudflare, I encountered difficulties in getting the response headers to pass through to the client, necessitating the use of the `` attribute instead.
@@ -148,4 +160,3 @@ I highly recommend checking out the sites I browsed while figuring this stuff ou
- ["Connect two NGINX's through UNIX sockets" by David Sierra](https://blog.davidsierra.dev/posts/connect-nginxs-through-sockets/)
- ["Create a complete Tor Onion Service with Docker and OpenSUSE in less than 15 minutes" by Jason S. Evans](https://www.youtube.com/watch?v=iUxiTk6w1sc)
- [Onionscan Documentation](https://onionscan.org/)
-
diff --git a/content/blog/understanding-srdi.md b/content/blog/understanding-srdi.md
index e228ead..a80a172 100644
--- a/content/blog/understanding-srdi.md
+++ b/content/blog/understanding-srdi.md
@@ -9,7 +9,7 @@ categories = []
In the ever-evolving landscape of malware, Shellcode Reflective DLL Injection (RDI) stands as a formidable technique despite its age, distinguished by its stealth and efficiency. Unlike traditional DLL injection methods, which often leave apparent traces for AV systems to detect, RDI operates on a more subtle level. Basically it challenges typical defensive solutions such as behavior monitoring, heuristics, or signature-based detection.
-Implementing a reflective loader myself provided a great insight into PE files and Windows API, and it's definitely a good initial foothold into more advanced techniques.
+Implementing a reflective loader myself provided a great insight into PE files and Windows API, and it is definitely a good initial foothold into more advanced techniques.
## Steps