-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Deploy exploiitm/blog to exploiitm/blog:gh-pages
- Loading branch information
GitHub Actions
committed
Sep 21, 2024
0 parents
commit a13b0a5
Showing
62 changed files
with
4,588 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
<!doctype html><title>404 Not Found</title><h1>404 Not Found</h1> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
<!doctype html><html lang=en><head><script>MathJax={tex:{inlineMath:[['$','$'],['\\(','\\)']],displayMath:[['$$','$$'],["\\[","\\]"]],processEscapes:true,processEnvironments:true}}</script><script async id=MathJax-script src=https://cdn.jsdelivr.net/npm/mathjax@3/es5/tex-mml-chtml.js></script><meta charset=UTF-8><meta content="IE=edge" http-equiv=X-UA-Compatible><meta content="text/html; charset=UTF-8" http-equiv=content-type><meta content="width=device-width,initial-scale=1,user-scalable=no" name=viewport><meta content="index, follow" name=robots><title>About</title><meta content=About name=title><meta content=exploiitm name=author><meta content="Official blog of Cybersecurity Club, IIT Madras" name=description><meta content=website property=og:type><meta content=https://exploiitm.github.io/blog/about/ property=og:url><meta content="exploiitm blog" property=og:site_name><meta content=About property=og:title><meta content="Official blog of Cybersecurity Club, IIT Madras" property=og:description><meta content=https://exploiitm.github.io/blog/favicon.ico property=og:image><meta content=summary_large_image property=twitter:card><meta content=https://exploiitm.github.io/blog/about/ property=twitter:url><meta content=About property=twitter:title><meta content="Official blog of Cybersecurity Club, IIT Madras" property=twitter:description><meta content=https://exploiitm.github.io/blog/favicon.ico property=twitter:image><link href=https://exploiitm.github.io/blog/about/ rel=canonical><link rel="shortcut icon" href=https://exploiitm.github.io/blog/favicon.ico type=image/x-icon><link href=https://speyll.github.io/suCSS/reset-min.css rel=stylesheet><link href=https://speyll.github.io/suCSS/suCSS-min.css rel=stylesheet><link href=https://exploiitm.github.io/blog/css/style.css rel=stylesheet><script defer src=https://exploiitm.github.io/blog/js/script.js></script><body><header><nav id=nav-bar><a href=https://exploiitm.github.io/> home </a><a href=/blog> blog </a><a href=/blog/writeups> writeups </a><a href=/blog/about> about </a><a href=/blog/contacts> contact </a><div><input id=theme-toggle style=display:none type=checkbox><label for=theme-toggle id=theme-toggle-label><svg class=icons id=theme-icon><use href=https://exploiitm.github.io/blog/icons.svg#lightMode></use></svg></label><audio id=theme-sound><source src=https://exploiitm.github.io/blog/click.ogg type=audio/ogg></audio></div></nav></header><main><h1>About</h1><p>We established ourselves as a small group of skilled cybersecurity enthusiasts in 2022 and became a club in the Centre for Innovation in 2023.<p>We are a dedicated group of students who share a strong passion for computer and information security. Our primary goal is to introduce students to the fascinating field of cybersecurity and address complex challenges through CTFs, research projects and collaborations with the industry.<p>What you can anticipate from our team:<ul><li>Active exploration and research in both well-established and cutting-edge areas of cybersecurity, often intersecting with other related fields.<li>We focus on solving real-world problems across diverse domains, including binary exploitation, cryptography, file forensics, web server exploitation, hardware exploitation, and more.<li>Through informative sessions and Capture The Flag (CTF) events, we aim to assist the student community in embarking on their cybersecurity journey and encouraging them to dive deeper into this exciting domain.</ul><h2 id=what-is-hacking>What is Hacking?</h2><p>We as a team personally feel that <em>The Art of Exploitation</em> tackles this question the best. Hence, we’ll be borrowing the author’s words for this.<p><em>Borrowing from <strong>The Art Of Exploitation</strong></em><p>The idea of hacking may conjure stylized images of electronic vandalism, espionage, dyed hair, and body piercings. Most people associate hacking with breaking the law and assume that everyone who engages in hacking activities is a criminal. Granted, there are people out there who use hacking techniques to break the law, but hacking isn’t really about that. In fact, hacking is more about following the law than breaking it. The essence of hacking is finding unintended or overlooked uses for the laws and properties of a given situation and then applying them in new and inventive ways to solve a problem — whatever it may be.<p>The following math problem illustrates the essence of hacking: Use each of the numbers 1, 3, 4, and 6 exactly once with any of the four basic math operations (addition, subtraction, multiplication, and division) to total 24. Each number must be used once and only once, and you may define the order of operations; for example, 3 * (4 + 6) + 1 = 31 is valid, however incorrect, since it doesn’t total 24.The rules for this problem are well defined and simple, yet the answer eludes many. Like the solution to this problem, hacked solutions follow the rules of the system, but they use those rules in counterintuitive ways. This gives hackers their edge, allowing them to solve problems in ways unimaginable for those confined to conventional thinking and methodologies.<p>Since the infancy of computers, hackers have been creatively solving problems. In the late 1950s, the MIT model railroad club was given a donation of parts, mostly old telephone equipment. The club’s members used this equipment to rig up a complex system that allowed multiple operators to control different parts of the track by dialing in to the appropriate sections. They called this new and inventive use of telephone equipment hacking; many people consider this group to be the original hackers.<p>The group moved on to programming on punch cards and ticker tape for early computers like the IBM 704 and the TX-0. While others were content with writing programs that just solved problems, the early hackers were obsessed with writing programs that solved problems well. A new program that could achieve the same result as an existing one but used fewer punch cards was considered better, even though it did the same thing. The key difference was how the program achieved its results — elegance. Being able to reduce the number of punch cards needed for a program showed an artistic mastery over the computer. A nicely crafted table can hold a vase just as well as a milk crate can, but one sure looks a lot better than the other. Early hackers proved that technical problems can have artistic solutions, and they thereby transformed programming from a mere engineering task into an art form.<p>Like many other forms of art, hacking was often misunderstood. The few who got it formed an informal subculture that remained intensely focused on learning and mastering their art. They believed that information should be free and anything that stood in the way of that freedom should be circumvented. Such obstructions included authority figures, the bureaucracy of college classes, and discrimination. In a sea of graduation-driven students, this unofficial group of hackers defied conventional goals and instead pursued knowledge itself. This drive to continually learn and explore transcended even the conventional boundaries drawn by discrimination, evident in the MIT model railroad club’s acceptance of 12-year-old Peter Deutsch when he demonstrated his knowledge of the TX-0 and his desire to learn. Age, race, gender, appearance, academic degrees, and social status were not primary criteria for judging another’s worth — not because of a desire for equality, but because of a desire to advance the emerging art of hacking.<p>The original hackers found splendor and elegance in the conventionally dry sciences of math and electronics. They saw programming as a form of artistic expression and the computer as an instrument of that art. Their desire to dissect and understand wasn’t intended to demystify artistic endeavors; it was simply a way to achieve a greater appreciation of them. These knowledge driven values would eventually be called the Hacker Ethic: the appreciation of logic as an art form and the promotion of the free flow of information, surmounting conventional boundaries and restrictions for the simple goal of better understanding the world.<p>This is not a new cultural trend; the Pythagoreans in ancient Greece had a similar ethic and subculture, despite not owning computers. They saw beauty in mathematics and discovered many core concepts in geometry. That thirst for knowledge and its beneficial byproducts would continue on through history, from the Pythagoreans to Ada Lovelace to Alan Turing to the hackers of the MIT model railroad club. Modern hackers like Richard Stallman and Steve Wozniak have continued the hacking legacy, bringing us modern operating systems, programming languages, personal computers, and many other technologies that we use every day.<h1 id=let-s-get-in-touch>Let’s get in touch</h1><p>Have a project idea or collaboration in mind? <a href=/blog/contacts>Get in touch</a> and let’s make it happen!<p class=tags-data></main><footer><hr><div class=footContainer><div class=footLeft><p>Licensed under <a rel="noopener noreferrer" href=https://fr.wikipedia.org/wiki/Licence_MIT target=_blank>MIT</a><br></div><div class=footRight><img class="footGif noStyle" alt=footGif loading=lazy src=https://i.ibb.co/XYDpfcs/foot.gif><a rel="noopener noreferrer" title="Subscribe via RSS for updates." class=metaData href=https://exploiitm.github.io/blog/atom.xml target=_blank>RSS</a></div></div></footer> |
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
<!doctype html><html lang=en><head><script>MathJax={tex:{inlineMath:[['$','$'],['\\(','\\)']],displayMath:[['$$','$$'],["\\[","\\]"]],processEscapes:true,processEnvironments:true}}</script><script async id=MathJax-script src=https://cdn.jsdelivr.net/npm/mathjax@3/es5/tex-mml-chtml.js></script><meta charset=UTF-8><meta content="IE=edge" http-equiv=X-UA-Compatible><meta content="text/html; charset=UTF-8" http-equiv=content-type><meta content="width=device-width,initial-scale=1,user-scalable=no" name=viewport><meta content="index, follow" name=robots><title>Contact Us</title><meta content="Contact Us" name=title><meta content=exploiitm name=author><meta content="Official blog of Cybersecurity Club, IIT Madras" name=description><meta content=website property=og:type><meta content=https://exploiitm.github.io/blog/contacts/ property=og:url><meta content="exploiitm blog" property=og:site_name><meta content="Contact Us" property=og:title><meta content="Official blog of Cybersecurity Club, IIT Madras" property=og:description><meta content=https://exploiitm.github.io/blog/favicon.ico property=og:image><meta content=summary_large_image property=twitter:card><meta content=https://exploiitm.github.io/blog/contacts/ property=twitter:url><meta content="Contact Us" property=twitter:title><meta content="Official blog of Cybersecurity Club, IIT Madras" property=twitter:description><meta content=https://exploiitm.github.io/blog/favicon.ico property=twitter:image><link href=https://exploiitm.github.io/blog/contacts/ rel=canonical><link rel="shortcut icon" href=https://exploiitm.github.io/blog/favicon.ico type=image/x-icon><link href=https://speyll.github.io/suCSS/reset-min.css rel=stylesheet><link href=https://speyll.github.io/suCSS/suCSS-min.css rel=stylesheet><link href=https://exploiitm.github.io/blog/css/style.css rel=stylesheet><script defer src=https://exploiitm.github.io/blog/js/script.js></script><body><header><nav id=nav-bar><a href=https://exploiitm.github.io/> home </a><a href=/blog> blog </a><a href=/blog/writeups> writeups </a><a href=/blog/about> about </a><a href=/blog/contacts> contact </a><div><input id=theme-toggle style=display:none type=checkbox><label for=theme-toggle id=theme-toggle-label><svg class=icons id=theme-icon><use href=https://exploiitm.github.io/blog/icons.svg#lightMode></use></svg></label><audio id=theme-sound><source src=https://exploiitm.github.io/blog/click.ogg type=audio/ogg></audio></div></nav></header><main><h1>Contact Us</h1><p>Welcome to the <strong>Cybersecurity Club of CFI, IIT Madras</strong>! We’re excited to connect with you. If you have any queries, feel free to reach out to us through the following channels:<hr><h3 id=email-email-us>📧 Email Us</h3><p>For any questions or collaborations, drop us an email at:<br> <strong><a href=mailto:cyseciitm@gmail.com>cyseciitm@gmail.com</a></strong><hr><h3 id=busts-in-silhouette-github>👥 GitHub</h3><p>Explore our projects over at GitHub:<br> <strong><a href=https://github.com/exploiitm rel=noopener target=_blank>Cybersecurity Club GitHub</a></strong><hr><h3 id=calling-whatsapp-channel>📲 WhatsApp Channel</h3><p>Stay updated with our latest activities and announcements:<br> <strong><a href=https://whatsapp.com/channel/0029VagYPmcJf05WWAIFbQ2c rel=noopener target=_blank>Join our WhatsApp Channel</a></strong><hr><h3 id=link-linkedin>🔗 LinkedIn</h3><p>Connect with us professionally on LinkedIn:<br> <strong><a href=https://in.linkedin.com/company/cybersecurity-club-cfi-iit-madras rel=noopener target=_blank>Cybersecurity Club on LinkedIn</a></strong><hr><h3 id=camera-flash-instagram>📸 Instagram</h3><p>Follow us for exciting updates and glimpses of our events:<br> <strong><a href=https://www.instagram.com/exploiitm/ rel=noopener target=_blank>Cybersecurity Club on Instagram</a></strong><hr><h3 id=globe-with-meridians-cfi-contact-page>🌐 CFI Contact Page</h3><p>Learn more about us and other CFI clubs at:<br> <strong><a href=https://cfi.iitm.ac.in/ rel=noopener target=_blank>CFI IIT Madras Contact Page</a></strong><hr><p>Feel free to reach out through any of these platforms. We look forward to hearing from you!<p class=tags-data></main><footer><hr><div class=footContainer><div class=footLeft><p>Licensed under <a rel="noopener noreferrer" href=https://fr.wikipedia.org/wiki/Licence_MIT target=_blank>MIT</a><br></div><div class=footRight><img class="footGif noStyle" alt=footGif loading=lazy src=https://i.ibb.co/XYDpfcs/foot.gif><a rel="noopener noreferrer" title="Subscribe via RSS for updates." class=metaData href=https://exploiitm.github.io/blog/atom.xml target=_blank>RSS</a></div></div></footer> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,105 @@ | ||
#nav-bar { | ||
padding: .925rem 0 0 0; | ||
display: flex; | ||
flex-direction: row; | ||
gap: 1.00rem; | ||
flex-wrap: wrap; | ||
justify-content: flex-end; | ||
align-items: center; | ||
align-content: flex-end | ||
} | ||
|
||
#footer-container { | ||
display: flex; | ||
flex-wrap: wrap; | ||
justify-content: space-between; | ||
align-items: center; | ||
} | ||
|
||
.accent-data { | ||
color: var(--accent); | ||
} | ||
|
||
.theme-transition { | ||
transition: color 0.3s ease, background-color 0.3s ease; | ||
} | ||
|
||
.tags-data { | ||
display: flex; | ||
flex-direction: column; | ||
flex-wrap: wrap; | ||
justify-content: flex-end; | ||
align-items: flex-start; | ||
align-content: flex-end | ||
} | ||
|
||
.title-list li { | ||
margin-bottom: .375rem; | ||
} | ||
|
||
/* icons settings */ | ||
.icons { | ||
width: 1.3rem; | ||
height: 1.3rem; | ||
aspect-ratio: 1/1; | ||
display: inline-block; | ||
vertical-align: middle; | ||
color: var(--text); | ||
fill: var(--text); | ||
background-color: transparent; | ||
cursor: pointer; | ||
} | ||
|
||
.icons:hover { | ||
background-color: transparent; | ||
color: var(--accent); | ||
} | ||
|
||
/* footnotes */ | ||
.footnote-definition { | ||
margin: 0 0 0 .125rem; | ||
} | ||
|
||
.footnote-definition-label { | ||
color: var(--accent); | ||
} | ||
|
||
.footnote-definition p { | ||
display: inline; | ||
margin: .625rem 0 0 .625rem; | ||
} | ||
|
||
/* general classes */ | ||
.no-style { | ||
padding: 10; | ||
margin: 10; | ||
border: none; | ||
border-radius: 0 | ||
} | ||
|
||
.no-style:hover { | ||
background-color: transparent; | ||
color: var(--accent); | ||
} | ||
|
||
.center { | ||
text-align: center; | ||
} | ||
|
||
.center img { | ||
display: block; | ||
margin: 1rem auto; | ||
} | ||
|
||
.float-right { | ||
float: right | ||
} | ||
|
||
.float-left { | ||
float: left | ||
} | ||
|
||
/* shortcodes css */ | ||
.webring { | ||
margin: .375rem; | ||
} |
Binary file not shown.
Oops, something went wrong.