Skip to main content

My Internship in Niksun India Pvt. Ltd. Gurgaon

My internship at Niksun India Pvt. Ltd. Gurgaon, was a fantastic experience & taught me a lot about the IT World and the insecurities present in the world, despite so many technological advancements & security systems in place.
NIKSUN delivers the best next-generation network monitoring solutions to secure critical infrastructure, optimize service delivery, and reduce compliance risks. In simple language, it designs tools to save your network & systems from any intrusion, stored data, record the critical information of all network transfers, etc…

My project at internship was Intrusion Detection System. In layman’s terms what I had to deliver at Niksun was, to write signatures for various attacks (or vulnerabilities present in system), so that they could be avoided in the coming future. In one of the assignments, I had worked with my team (3 members including me) to successfully launch an attack on a test system, to exploit the vulnerability in a version of Adobe Flash player. This was the same vulnerability, which led to Hacking of Sony, Japan in May,2011, when some hacker deleted all of their X-Box data & blueprints. We re-generated that attack on to our test system, & identified the pattern of attack, to let the Technical team write proper signatures for it.

We discovered that even the technological Giants like Sony, Microsoft, Adobe, and FreeBSD have many loopholes in their systems, which need to be filled up and updated from time to time. You can find a list of all possible hackings and vulnerabilities on various sites like, Secunia.com, secure-db.com, etc. Whenever an antivirus asks you to update the virus database, please do not ignore it. Trust me, you never know what is coming your way. We worked on several Network Monitoring software packages, which could literally capture all of the data transferring from & to the network. We studied them packet by packet. In addition, until the end of the internship, we had successfully identified patterns for many attacks allotted to us, and had written signatures identifying the attack, which was finally incorporated in the company’s database.

Darpan Khurana
B.Tech, 4th year
Published date : 12 Aug 2015 05:16PM

Photo Stories