Have you ever seen a bunch of geeks lock themselves up in a room, hacking throughout the day? This was witnessed when Wingify had its very first Capture The Flag battle.

Capture the Flag (CTF) is a special kind of information security competition which provides a safe and legal way to try your hand at hacking challenges. We have learned a lot of computer science and security concepts in classes, and by reading articles. But participating in a CTF actually teaches how to break into things when they are not implemented properly, which happens all the time in the real world. In this, all you need to do is to find a flag which is a proof that you solved the puzzle, and submitting it to the platform earns your team points. Flags are typically chosen to look very distinctive, so that when you see one, you’ll know that it’s a flag, and that you’ve solved the puzzle. For example, flag{congr4tz_y0u_found_1t}.


Sometime back, Facebook open-sourced a platform to host Jeopardy styled CTF competitions and we couldn’t resist ourselves from using it. It’s simply amazing and sleek. It took around 2-3 weeks to prepare for the event and we had fun brainstorming creating the problem set. Creating the problems required thinking of some real world scenarios from the field of software development and security and combine them with references like Mr. Robot, Snowden, etc. A few ideas were taken from prior experience participating in online CTFs and Wargames.


Wingify CTF was an internal event and very first of its type. Bonus points were offered for teaming up with someone from a non-engineering role. We saw some great participation from the customer support, customer success & marketing teams as well. To bring everyone on the same page, participants were asked to register for the event by solving a teaser. And the teaser was to find a flag in a registration form. You’d be surprised to hear that the form was made using Google Forms 😮.

It was an 8-hour long online event which had 45 participants among 16 teams. There was a total of 12 challenges ranging between 40 and 400 based on the difficulty level with total available 1840 points. The set of challenges included problems in web application security and forensics. There was another teaser to be solved before starting off the real game. Early in the CTF, everyone was doing pretty well especially team Matrix and Hunters. In half of the time, quite a good number of hackers were already done with all the problems except the two most difficult ones. When the team Rootcon and Hustlers solved the challenge worth 400 points, they were the clear winners on everyone’s mind. But as they say, it’s not over till it’s over. At the last-minute when team RSS captured that big flag and stood the first place, it was the same feeling like a dramatic last-minute goal in Football.👏


I’d like to mention some of the interesting challenges.

  1. XSS - When we talk about Frontend security, cross-site scripting is the first vulnerability that comes to everyone’s mind. One of the challenges was to detect an XSS vulnerability and exploit it by stealing the cookies. The key challenge while creating this problem was using PhantomJS, a headless WebKit, to check whether the XSS payload got successfully triggered. shell_exec('phantomjs fake-browser.js --url' . $url . ' --password ' . getenv('FLAG'));

  2. S3 Secrets/Credentials - This problem was based on the fact that the credentials, such as Amazon S3 keys, Github tokens, and passwords, are often included in published GitHub repositories. Once you have put sensitive data in a Git repository, it is going to stay in the repo’s history forever (there are ways to avoid this).

  3. Encryption - One of my personal favorites was the problem requiring teams to calculate the MD5 of a given string. Sounds pretty straight, right? The challenge is right here in front of you. Can you capture the flag and send it to [email protected]? 😊


  1. Team RSS - Rachit Gulati, Sahil Batla, and Sandeep Singh

  2. Team ROOTCON - Gaurav Nanda, Aakansh Gulati, and Ankita Gupta

  3. Team HUSTLERS - Rahul Kumar, Arun Sori, and Dinkar Pundir

Each participant from the top two teams was given Yubikey and Bluetooth Speaker respectively.

Chhavi and I were able to pull off the event successfully. It turned out to be great and everyone had fun hacking together. I would highly recommend doing something like this for your organization. This will surely increase the breadth of security knowledge.

Mini CTF (External)

Last week, Wingify hosted a PyData Meetup and attendees played a quick round of CTF. You can find the pictures below.

If you would like to practice for such events, you should definitely participate in the online CTFs. You can find the list of long-running CTFs. And if you like playing CTFs, we are hiring for Security Engineer position 😍 🙂.

I am a frontend developer at Wingify and I am building a really awesome product, PushCrew. Last month, we had a hackathon. The idea was to ‘Solve Daily Problems’, interesting right? 😃

I am an avid reader and I read a lot of stuff on the web, but I often find myself copying parts of different articles and pasting in my notepad. I always thought that it would be a great idea to have all my summaries at single place. I wanted a platform that could show all the highlighted parts of the articles that I have liked without me having to juggle between different tabs. So instead of waiting for an app like this to be built, I went ahead and created a micro bookmarker at the hackathon.

My idea was simple, and I knew that I could build it alone. So I was a one-person team (Obviously me! 😛 ).

The idea was not just to build, but also to learn something new because that’s the whole purpose of attending a hackathon, right? Since I had never built a Chrome extension before, I started reading about how to build an extension and took some guidance from our in-house frontend God, a.k.a chinchang 😛 . I devoted some good chunk of time to decide my strategy for building the product.

So, after spending an entire night on coke and pizzas, I was able to build a beautiful extension which was working, and solving, at least my problem of highlighting parts of articles that I liked on the web. I really hope it helps a lot of people (read: readers) as well.

Download this awesome application now 🤘 .

Here are a few glimpses of my hack.

Sum It Up demo
Another Sum It Up demo

Prohibited content (Only for geeks):

As soon as the user selects some text on the page (HTML) and right clicks on it, (s)he is shown an option to ‘Save to Sum it up’ in the context menu. On clicking the option, Sum It Up saves the highlighted data (color, text, DOM node, page URL, timestamp etc.) in the JSON format to the local storage (so no breachment of privacy) inside the Chrome browser. The main challenge was to maintain the highlighter for the partial DOM selection which I have solved by putting the custom span tag to all the elements which reside in that selected area.

Some features that you might find useful are:

  1. (High) light it up.
  2. Collect your notes.
  3. Email them.
  4. Searching made easy.
  5. Tweet your note.
  6. Are you a markdown lover? Yes you can export in markdown too.
  7. Directly jump to the micro section of the website.

Sum It Up got featured on Product Hunt too! Yippee :) (My very first submission on Product Hunt and that too got featured, it’s like Diwali Bonus 😀 )

PS: This is my first blog post so please be kind to me. I am open to any feedback 😀

Recently, Wingify had organised a 24-hour Internal Hackathon where the developers from Wingify created a lot of awesome projects for daily use. The theme was “Solve Daily Problems”. Be it a generic problem or an internal team problem, hackers from Wingify tried to solve many problems over the night. So, Pramod Dutta and I created a Google Chrome extension “VWO X-Ray” (one of the winners), which has proved to be helpful to our internal team.

VWO X-Ray was created to easily debug the VWO smart code on a website. Whether it’s a developer or a Customer Happiness Engineer or a client, they need some basic information about VWO running on a particular page. This Google Chrome extension enables the user to view the account ID, the running VWO campaigns and the cookies created by VWO on that page. The basic features of the extension are:

  1. View account ID on the page and impersonate into it directly.
  2. The Home Tab will show all campaigns on the page and their information like whether campaigns are running, segmentations passed etc.
  3. Directly open a specific campaign, with a single click, into the VWO app.
  4. Directly copy the “Share report link” of the campaign and share it with anyone.
  5. View VWO cookies’ information in a detailed and clear view.
  6. Notification feature when any campaign variation is applied on the page or any goal has been triggered.
  7. The Full Data Tab will give you a glimpse of the app dashboard. You can change the account ID to get any other account’s data.
  8. The Session Data Tab will show current session’s information (Track and Analyse), various campaigns’ data and goals’ data (which ones have been triggered and which ones have not been).
  9. The Impersonate Tab will enable you to impersonate into any account and campaign directly. Just enter the account ID and campaign ID(optional).
  10. This extension, by default, makes 100% sampling rate for Track and Analyse campaigns (most wanted feature for our QA team and Customer Happiness Engineers team).

Here are some screenshots of the VWO X-Ray extension running on our vwo.com website:

The various campaigns running on the page and their statuses

A clear view of the session data information

We will also be shortly releasing this to our clients, so that they too can get basic information just by using the extension.

Here is the demo of VWO X-Ray:

Last two months were quite amazing for me as a Wingifighter; I was on a traveling spree over Italy and London. I got an opportunity to attend and speak at various international conferences and meetups there, which gave me new insights on the importance of JavaScript and Security. It was a new experience for me as I got a chance to meet some great people and learn a lot from them. This post is about my learnings and overall experience representing Wingify and driving the concept of Web Security at various tech events.

1) Node.js Conference, Italy (22nd October 2016)

I attended my first International Conference which was held at a beautiful place – Desenzano del Garda, Italy. I was one of the speakers and I talked about Node.js Security.

The conference started with a keynote by Microsoft’s Bryan Hughes (@nebrius) about the Node.js community and its evolution. He later introduced us to the Node.js foundation hierarchy and how it operates at various levels. Other speakers, too, touched various relevant and interesting topics including AsyncHooks, Load Balancing, and Deploying Node.js at scale. You can find more information at http://nodejsconf.it/

Speaker dinners were a great platform where I got to interact and network with fellow speakers. I also met Feross and I found him to be very humble and polite. He insisted on why fun side-projects are important and why you should keep doing them. And that’s why Wingify runs “Show n Tell” in which Wingifighters demonstrate and discuss any side projects that they are working on.

I spent the rest of my time in Italy in traveling and had a wonderful experience. I fell in Love with Gelatos🍦.

2) London Ajax Meetup (14th November 2016)

This is a monthly meetup that happens in London. This time the focus of the meetup was JavaScript Security and Neural Networks. I got a really good response after my talk. The venue was Skills Matter Office where a couple of other meetups were going on simultaneously. I realized this when I went into another arena searching for food and none of the people seemed to recognize me.

The other talk during the event was on “Classifying Numbers as Odd or Even With Neural Networks,” by Matt Zeunert. It was quite informative.

3) SeleniumConf UK (14th-16th November 2016)

SeleniumConf is an event focused on Web Testing and brings together Selenium developers and enthusiasts from around the world to share ideas, socialize, and work together on advancing the present and future success of the project.

My talk in this conference was about Web Security and Efficient Penetration Testing. I gave a live demo of my recent finding (security vulnerability) in InVision. With the help of Burp Suite and BeEf, I demonstrated how a malicious comment in Invision App can be used to control browser and steal information. You can read more about the vulnerability details I published in Hackernoon.

Here are the links to the video and slides.

4) Half Stack Conference (18th November 2016)

HalfStack is a one-day, single track, fun and unique JS conf in a pub 🍺. It was good to sit down and listen to Christian Heilmann, Remy Sharp and Dylan Schiemann. There were a lot of other interesting talks at the conference. Video recording for all sessions are available here.

After the conference, we went to another pub for a “JavaScript Pub Quiz.”

The following is an emoji mathematical example given by Mark Wubben in his talk on Babel

🍺 + 🍺 = 🍻

🍻 + 🍻 = 😆

(🍻 * 🍻)^🍻 = 😵

To sum up

I got to learn a lot from my travels. I would encourage everyone to follow and attend such conferences and events.

You can keep an eye on the list of FrontEnd Conferences for 2017 and follow Himanshu’s twitter list to stay up-to-date.

Happy Holidays! 🎄🎁

Few days back, we open-sourced our internal Skype bot to the world. Its called Heybot!, but we call it Ramukaka at Wingify :) Whether its about running a jenkins build or getting a customer info from account ID, Ramukaka does it all for us.

Heybot! gives you a simple framework to write commands that you can run, with provision of restricted access to some commands by power users only. Its written over Microsoft’s bot framework, designed to be extensible for any sort of task in small and large teams. Bot framework based bots work out of the box with Skype, but the same bots can act as a base for a Messenger, slack etc bot too.

So if your team communication is on Skype (or even if you work alone) and regularly do some tasks which could be automated through a command, Heybot! can definitely prove useful for you. Lets see how you can quickly set it up for Skype.


Heybot! is written in NodeJS. To set it up on a server you need to clone the Github repository first:

git clone [email protected]:wingify/heybot.git

and run npm install in the repository folder to install all the required dependencies.


Before you can start using the bot on Skype, you need to create a bot and register it with Microsoft as an app. Create a Microsoft app as directed here. When you register your bot, you’ll have to give it a name of your choice that will be used in Skype chat to talk with it.

Once you register the bot, you’ll have an app ID and app Password with you. Go ahead and create a copy of the file creds.template.js into creds.js and replace the ID and password in it. If you don’t want to store the ID and password in that readable file, you can have the same keys set as environment variables and Heybot will read from there. Note, that you still need to have a dummy creds.js file.

The bot framework requires the bot server to be running on a valid secure connection. Therefore, you’ll need to provide the Heybot with your domain’s SSL certificates (the .crt and .key files). Place them in the repository folder as ssl.cert and ssl.key.

Running the bot server

Now that you have setup your bot, you can run the bot server by running the command npm start. Similarly to stop it you can run npm stop.

Adding your bot on Skype

The bot you setup would in most cases have commands that you use on day to day basis and it won’t make sense to put such a bot publicly on the Microsoft bot marketplace. For this reason, you can keep you bot in preview mode - just available for you and anyone with the link to add the bot.

Go to your bot’s page from https://dev.botframework.com/bots. Now click on the Add to Skype button to add it to your skype.

Once you have added it your skype, you are all set to give it commands. Lets assume you gave your bot the name droid while registering. You can test your new bot by starting a conversation with it and saying anything. If it replies with a Hello message, its working perfectly. You can then try out pre-loaded commands such as !bored, !sad, !bitcoin etc.

If you add the bot to a group chat, you can give it command by simply mentioning its name before the command’s usual syntax. Eg. @Droid !bored.

There you go! Build your own commands and automate your daily boring tasks with Heybot! And do tell us on Github about any feature request, suggestion or any cool command that you made for Heybot!