It involves using mathematical concepts and a set of calculations in order to maintain integrity and authenticity of the information being transmitted. It protects data in the presence of 3rd parties and is widely used in our day to day lives.
Mainly used in cybercrimes, it is the investigative process of collecting, recovering, analysing and reporting any valuable digital information in devices. It is used not only to identify network vulnerabilities but also to develop ways to mitigate them.
We conduct research on topics such as Side-Channel Attacks, Intrusion Detection and Privacy Enabled Machine Learning. Apart from that we also deal with the different approaches which bring together other fields such as ML/AI, Quantum Computing.
It is the task of deconstructing software to extract information from it. Reverse engineering helps to make a system robust hence ensuring that a system doesn’t have any significant security flaws and protects it from hackers and spyware.
It is a commonly used method to attack websites. It takes advantage of vulnerabilities that exist in order to gain control of the site, such as hosting server, which could result in loss or theft of information.
A type of cybersecurity competition where competing teams attempt to find security vulnerabilities in services run by the opposing teams. Each team works finding vulnerabilities in other team’s services while protecting their own.
We coordinate the working of the different subsystems of the team. We handle the finance, sponsorship and publicity with regards to all events held by the team, along with handling the Social media handles and the design and graphics
Charan Teja
Web Exploitation
Rishabh Das
Web Exploitation & Web Development
Vedant Rishi Das
Reverse Engineering
Purnima Jain
Web Exploitation
Tanisha Agarwal
Management
Sameer Saxena
Forensics
Arkaja Sharan
Cryptography
Sritanvee Dabburi
Management & Writing
Swathi C
Design & Graphics
Himanshu Sandhu
Management
Sushant Shekhar
Management & Writing
Vignesh S
Reverse Engineering & Cryptography
S Sitaraman
Web Exploitation
Yash Mandhania
Cryptography
Kunyalik Garg
Forensics