content-photo

`WELCOME` To Our Cyber Security Crew

Cyber Security is not about attact Someone's whatsapp or password. It's about exploiting someone mind

Cyber Security persons are Geniuses. Not Because they are smart, but because they can Control the whole World with a click of a button

Enroll Now

The Courses We Offer !

smartphone

Android Vulnerability Detection

computer

System Exploiting

SQL Injection

Javascript

PHP

SQL

1. Reconnaissance

This is the first step of cyber security. It is also called as Footprinting and information gathering Phase.

2. Scanning

This phase includes the usage of tools like dialers, port scanners, network mappers, sweepers, and vulnerability scanners to scan data.

3. Gaining Access

In this phase, the security analyst designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2.

arrow_circle_up
4. Maintaining Access

Once a the cyber security person has gained access, they want to keep that access for future exploitation and attacks. Once the cyber security person owns the system, they can use it as a base to launch additional attacks.

5. Clearing Tracks

Prior to the attack, the attacker would change their MAC address and run the attacking machine through at least one VPN to help cover their identity.