Behind The Crime
Join our dynamic workshop on Sniffing, Steganography, Cryptography, Basic Attacks, and Offensive Security! Delve into the intricacies of network sniffing, uncovering hidden messages through steganography, and mastering cryptographic techniques. Explore the fundamentals of basic attacks and offensive security strategies to fortify your digital defenses. Led by seasoned experts in cybersecurity, this workshop offers hands-on experience and invaluable insights into the world of information security. Whether you're a novice or a seasoned professional, expand your knowledge and sharpen your skills in this comprehensive training session. Don't miss out on this opportunity to enhance your understanding of cybersecurity essentials!
Faculty coordinator:
Ms.Jayalakshmi P-9894795761
Ms.Kavitha D-9445681974
Student coordinator
Roshan-9080526025
Dhanush-7823990075
Rules for Behind The Crime
- Each team is limited to a maximum of three participants.
- Participants are required to install the necessary Virtual Machines and tools such as Kali Linux and Metasploitable 2.
- Participants are strictly prohibited from sharing any private information or details related to the event with individuals who have not been assigned for a task yet.
- It is forbidden to engage in any attempts to infiltrate computer systems with the intent or knowledge to cause loss of data. Any cases of backlash will not be accepted from the participants during the event.
- Unauthorized access to data, systems, or networks is strictly prohibited. Participants must refrain from spreading computer viruses, malicious code, or engaging in any hacking activities on other computers.
- Do not perform (or attempt) non-technical attacks, including but not limited t
- By chance that two or more teams have the same number of points, the team that had taken the least time to solve the challenges will be crowned the winner