Behind The Crime

Unlock the secrets of Cyber Security Breaches" delves into the intricate world of cybercrime, offering an insightful exploration of its mechanisms and motivations. Through meticulous research and real-world case studies, the book unravels the complexities behind cyber security breaches, shedding light on the tactics employed by hackers and the vulnerabilities they exploit. From sophisticated phishing schemes to intricate malware operations, each chapter unveils the anatomy of cyber attacks, providing readers with valuable insights into the evolving landscape of digital threats. By unraveling the layers of deception and intrigue, "Behind The Crime" equips readers with the knowledge and understanding needed to navigate the treacherous waters of cyberspace and safeguard against potential threats.

Faculty coordinator:
Ms.Saranya G- 8870098588
Ms.W.Ancy Breen- 9094033048
Student coordinator
Krisha-7358437022
Sudarshan -9840939587

₹129 / Per Team

Rules for Behind The Crime

  • Each team is limited to a maximum of three participants.
  • Participants are required to install the necessary Virtual Machines and tools such as Kali Linux and Metasploitable 2.
  • Participants are strictly prohibited from sharing any private information or details related to the event with individuals who have not been assigned for a task yet.
  • It is forbidden to engage in any attempts to infiltrate computer systems with the intent or knowledge to cause loss of data. Any cases of backlash will not be accepted from the participants during the event.
  • Unauthorized access to data, systems, or networks is strictly prohibited. Participants must refrain from spreading computer viruses, malicious code, or engaging in any hacking activities on other computers.
  • Do not perform (or attempt) non-technical attacks, including but not limited t
  • By chance that two or more teams have the same number of points, the team that had taken the least time to solve the challenges will be crowned the winner

Check our other events