n|u jobs is our security job board. We have turned 3 years old today. In these 3 pretty successful years we have received 10000+ applications for about 900 jobs from more than 200 companies.
null is a registered not for profit society set up to spread awareness about Information Security and to further research in this field as well. From its humble beginnings in Pune to being a national level organisation in just over 3 years has been possible because of the amazing community of volunteers who are definitely drawn to working with null due to its non-profit status.
After a long time we had an Humla Session in Pune. And I am happy to let you all know that it was great one. Though I personally missed upon it, the “Wireless Security Session – Part -I” was really great as per the feed backs received from the attendees.
3 years is a pretty long time, especially in Internet time. 36 months, over 1000 days. Anything lasting that long and growing from strength to strength is worth celebrating. We will be completing 3 years when we all meet on the 11th day in the month of August 2012 for the monthly null Bangalore meet-up.
Humla (meaning attack in Hindi) is a completely hands-on workshop with the clear focus on learning the tools, techniques and approaches of offensive hacking using simulated servers and networks.
Humla is different from a normal null meet in its focus and duration. The focus is on learning specific tools and techniques and the duration is about 5-6 hours of hands-on work.
Written by: cr01nk (firstname.lastname@example.org)
Before you start reading this blog, i would like you to know that i like to be wrong because i believe that it is the only way i can correct myself. So if anything you feel is wrong, or is not addressed in its proper terms. Please leave comments below. Thanks
It was 5:30 PM, I was sitting in my cube lazying around, doing nothing and suddenly it dawned on me, Why not pwn our own site (empty mind is devil’s workshop :P). I started to write a small html page that had the most common features of a defaced page, black background, red font, st3r30typ1c4l 4lph4b3t. At the end of the file I had put a message in black font color just to see if ppl take the time to go through the source of the page, actually also to prove that it was not an actual defacement :-P, which was a more factor. I asked Ajit for a code name for the defacer and he suggest the mock of India’s biggest H4ck3r ever (yeah u guessed it right :-P, The Lamer). I deliberately pointed corrupt to the website and he understood that it was a prank and simultaneously sanyal also got to know about it. Abhijeet and Rohan fell for it and talked to Corrupt and Antz(who assumed it to be a prank). I had advised everyone who knew about it not to tell anyone else, not even the moderators.
Event : CopTech Date : 16th September Venue : Commissioner Office, Pune
Introduction to CopTech :
Pune Police along with Nasscom and Data Security Council of India (DSCI) on 30 June, established the Cop Tech forum to increase sharing of ideas & knowledge on cyber security between the Cops and the IT Industry. In presence of many CXO of reknowned IT Industry and top brass cops Commissioner of police Satya Pal Singh signed a memorandum of understanding (MoU) with Nasscom.
I often get asked by many people on how we discover new vulnerabilities or code exploits. So, finally I decided to spend some time and make a small tutorial on what vulnerability research is all about.
Ok, the name is a pun on Titan’s watch 😛 and is something that is an outcome of a really cool bash feature which I’ll be discussing. Bash provides a way to create a TCP connection or send UDP packets to a host on a given port, the cool thing is that you don’t have to rely on other scripting languages or programs for creating sockets/network connections when writing a shell script. Using this feature one can write simple to complex network utilities/scripts (a sigh of relief for scriptters :-) if that is that a word ). NOTE: This is a bash provided feature(if it is compiled with –enable-net-redirections option) and has nothing to do with /dev Devices.