- Schedule
- Venue
- Speakers
- Training
- CFP
- Volunteer
- Recreation
- Blackshield Awards
- CTF
- Sponsors
- Exhibition
- Job Fair
- CXO Track
- Goa'16
- CTF
CAPTURE THE FLAG
COMPETITIONS

TO Commit a SIN is Human.
TO Learn from SINs is a Better Human.
TO Learn from others SINs... its like a Hacker
TO Exploit others SINs with SYN/FIN/ACK/RST
We are proud to present the seventh edition of
HackIM 2016 Powered by EMC Defenders League.
Starting from : 29th Jan, 2016 10:00 PM (GMT +530).
Battle on Till : 31st Jan 2016 10:00 PM (GMT +530).
Get in the Zone, Register at http://ctf.nullcon.net
Its a not just a CTF its a WAR, WAR on your SIN
Some SINs your must befriend & some you must
Conquer...
++ Here best Hackers will clash for their PRIDE
++++ Only 1 coveted title that rest all will ENVY
++++++ The Machines will feel the real WRATH
+++++++++ get on IRC for Clues, show GREED
++++++ 48Hr Hacking Marathon Kill the SLOTH
++++ Crack the codes and lust for Flags.. LUST
++ Hack Well with Pizza & Beer Go GLUTTONY
Sync up your watch, mark planner set the alarm
All the SINs are fair in CTF & WAR, All the Best
Top 30 teams would be considered for following rewards:
- Winner will get Gadget worth INR 50K.
- First Runner Up will get Gadget worth INR 20K.
- Second Runner Up will get Gadget worth INR 10K.
- Top 30 participants will get EMC Defenders League Tshirt and Certificate, if they choose to attend Nullcon Goa 2016.
The unofficial back channel for the CTF is at irc.freenode.net #null0x00
Good luck and have fun :)
Special Thanks to the volunteers and supporters without whom this would not have been possible.
http://ctf.nullcon.net/madprops.php

Coming Soon

The Red Team Blue Team approach is a well known model for network security where the Red Team is tasked with Penetrating the network and its assets as much as possible while the Blue Team is responsible for identifying vulnerabilities and weaknesses ahead in order to take necessary measures to protect against successful attacks against those vulnerabilities.
The EMC Defenders League 2015 consists of an on-site capture the flag (CTF) event involving 30 participants selected during an earlier online event. The participants compete with each other in a game designed following the Red Team Blue Team model of network security. Auxiliary challenges are also presented to score extra points. The challenges involved during the event varies across multiple topics in information security including network security, web application security, software exploitation, cryptography, forensics etc.
Winner Receives a CASH PRIZE of INR 500000 /-
Gear up for the Ultimate Security Challenge. Reinforce Trust in IT !
Greetings Ladies,
Are you a security enthusiast? Have you ever wished to be a part of puzzle-solving competition, but never got a chance to participate? Have you ever wanted to test your knowledge by solving hacking simulated challenges? Well then here’s your chance to be a part of Winja!
Why be a part of WINJA ?
Well, Winja focuses on bringing women in tech ahead and to help them explore their potential in a comfortable environment and to geek out without feeling intimidated.
What is WINJA ?
Winja – CTF is a complete “challenge based” set of simulated hacking challenges relating to “Web Security”, separated into small tasks that can be solved individually by the women attendees, who will attempt to attack and defend the computers and networks using certain tools and network structures.The duration of the event would be of 2 hours.

Agenda
The CTF is constituted of 3 parts
Prize
The winner takes away:
Rules and Guidelines
Winja Sponsor
Participants Requirement
Hardware requirements
Software requirements
Winja – CTF lets you test your hacking skills and helps you learn new as well as different attack methodologies to exploit a vulnerability.
This is a unique event with the aim to spread awareness of information security among the Women.
So, Ladies are you ready to Goa...?
About Me
Sneha Rajguru
Sneha works as a Security Consultant with Payatu Technologies Pvt.Ltd. and holds C.E.H and E.C.S.A certifications. Her area of interest lies in Web application and mobile application security and fuzzing. She has discovered various serious application flaws within open source applications such as PDFLite. Jobberbase, Lucidchart and many more.
She is also an active member of Null – The open security community in India, and a contributor to regular meetups at the Pune chapter. She has spoken and provided training at GNUnify, FUDCon 2015, Defcamp #6 2015.