diff --git a/images/portfolio-images/BRCTF2024/brctf_exhaustion.jpg b/images/portfolio-images/BRCTF2024/brctf_exhaustion.jpg new file mode 100644 index 0000000..e9a0dda Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_exhaustion.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_exhaustion_th.jpg b/images/portfolio-images/BRCTF2024/brctf_exhaustion_th.jpg new file mode 100644 index 0000000..3fe960f Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_exhaustion_th.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_participants.jpg b/images/portfolio-images/BRCTF2024/brctf_participants.jpg new file mode 100644 index 0000000..5bb7a59 Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_participants.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_participants_th.jpg b/images/portfolio-images/BRCTF2024/brctf_participants_th.jpg new file mode 100644 index 0000000..242f970 Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_participants_th.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_solving_challenges.jpg b/images/portfolio-images/BRCTF2024/brctf_solving_challenges.jpg new file mode 100644 index 0000000..b26529e Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_solving_challenges.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_solving_challenges_th.jpg b/images/portfolio-images/BRCTF2024/brctf_solving_challenges_th.jpg new file mode 100644 index 0000000..e028c68 Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_solving_challenges_th.jpg differ diff --git a/images/portfolio-images/HACKGDL.jpg b/images/portfolio-images/HACKGDL.jpg new file mode 100644 index 0000000..dacd64a Binary files /dev/null and b/images/portfolio-images/HACKGDL.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_festive.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_festive.jpg new file mode 100644 index 0000000..b9d4fe4 Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_festive.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_festive_th.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_festive_th.jpg new file mode 100644 index 0000000..9297264 Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_festive_th.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_pinata.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_pinata.jpg new file mode 100644 index 0000000..dacd64a Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_pinata.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_pinata_th.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_pinata_th.jpg new file mode 100644 index 0000000..e6019ed Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_pinata_th.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_sponsors.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_sponsors.jpg new file mode 100644 index 0000000..8142e99 Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_sponsors.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_sponsors_th.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_sponsors_th.jpg new file mode 100644 index 0000000..10c705d Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_sponsors_th.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city.jpg b/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city.jpg new file mode 100644 index 0000000..9d58e6e Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city_th.jpg b/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city_th.jpg new file mode 100644 index 0000000..0c57cb8 Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city_th.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/model_city_closeup.jpg b/images/portfolio-images/OFFENSIVEX2024/model_city_closeup.jpg new file mode 100644 index 0000000..807bffd Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/model_city_closeup.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/model_city_closeup_th.jpg b/images/portfolio-images/OFFENSIVEX2024/model_city_closeup_th.jpg new file mode 100644 index 0000000..5802779 Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/model_city_closeup_th.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area.jpg b/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area.jpg new file mode 100644 index 0000000..ad3baff Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area_th.jpg b/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area_th.jpg new file mode 100644 index 0000000..5a77c77 Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area_th.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants.jpg b/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants.jpg new file mode 100644 index 0000000..e0d6c05 Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants_th.jpg b/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants_th.jpg new file mode 100644 index 0000000..0c3af4d Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants_th.jpg differ diff --git a/index.html b/index.html index 1c98a3d..bea6bab 100644 --- a/index.html +++ b/index.html @@ -1,4377 +1,2724 @@ - - - - - - - - - - -Welcome to echoCTF.com - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - -
- -
- - - - -
- - -
- - -
- - - -
- -
- - -
- -
- - - -
-
- - - -
- -
- -

- - - -

- Welcome to the innovation of cybersecurity exercises -

- - - - - - - -
- - MORE DETAILS -
- -
- -
- -
- - - -
- -
- - - -
-
- - - -
- -
- -

- - - - -

- Over 200 hackable elements -

- - - - -

We build fully functional hackable smart city dioramas to accompany our exercises

- - - -
- - MORE DETAILS -
- -
- -
- -
- - - - -
- -
- - - -
-
- - - -
- -
- -

- - - - -

- Hackable public transportation -

- - - - -

Gain access to trains, buses, airplanes

- - - -
- - MORE DETAILS -
- -
- -
- -
- - - -
- -
- - - -
-
- - - -
- -
- -

- - - -

- Compromise road safety -

- - - -

Attack traffic signals, street lights, digital signs

- - - -
- - LEARN MORE -
- -
- -
- -
- - - -
- -
- - - -
-
- - - -
- -
- -

- - - -

- Real life scenarios for airport operations -

- - - -

Hack the airplanes, terminals, departures/arrivals, control tower

- - - -
- - LEARN MORE -
- -
- -
- -
- - - - -
- -
- - - -
-
- - - -
- -
- -

- - - -

- Real world scenarios for military operations -

- - - -

Hack military control rooms, radars, missiles and more

- - - -
- - LEARN MORE -
- -
- -
- -
- - - -
- -
- - - -
-
- - - -
- -
- -

- - - - -

- Hackable energy and water plants -

- - - - -

Gain access to power plants, solar farms, oil refineries, water treatment plants

- - - -
- - LEARN MORE -
- -
- -
- -
- - - -
- -
- - - -
-
- - - -
- -
- -

- - - - -

- Hackable public and private services -

- - - - -

Gain access to hospitals, police stations, banks, telecoms and more

- - - -
- - LEARN MORE -
- -
- -
- -
- - - -
- -
- - - -
-
- - - -
- -
- -

- - - -

- Want to try our platform? -

- - - -

Join online for free at echoCTF.RED

- - - -
- - MORE DETAILS -
- -
- -
- -
- - -
- - - -
- - - - - -
PREV
- -
- - - -
- - - - - -
NEXT
- -
- -
- - - -
-
- -
- - -
- - -
- - -
- - -
- -
- - -
- - -
- -
- - - -
-
-
-
-
-
-
-
- -

- Do you want to be a part of this world? - -

- - -

Give us your requirements and we will create a solution just for you.

- -
- - - - -
- -
- -
- -
- -
- -
- -
- - - - -
-
-
-
- -
- -
-

echoCTF

- -

How cybersecurity training should be

- -
- -
- -
- - - -
- - -
- -
- - -
-
- -
- -
- -
- -
- Real life systems -
- -
- - - -
- -

Real life systems

- - - -
-

Special crafted systems with attack and defence scenarios that are accurate and representative examples - of current security threats employed by exploits, trojans and malware found in the wild

-
- - - -
- - - -
    - -
- -
- -
- -
- -
- -
- - -
- -
- -
- -
- -
- Hackable Dioramas -
- -
- - - -
- -

Hackable Dioramas

- - - -
-

Fully functional and hackable smart city dioramas are added to our exercises to promote a deeper way - of understanding the effects of real life cyber attacks

-
- - - -
- - - -
    - -
- -
- -
- -
- -
- -
- - -
- -
- -
- -
- -
- Element of fun -
- -
- - - -
- -

Element of fun

- - - -
-

echoCTF exercises are in the form of a capture the flag game in order to make training more interesting and fun

-
- - - -
- - - -
    - -
- -
- -
- -
- -
- -
- -
- -
- -
- - - -
-
-
-
- -
- -

SERVICES

- - - -
- -
- -
- -
- - -
- -
- -
- -
- -
- CTFs -
- -
- - - -
- -

CTFs

- - -
 
- - - -
- - -
    -
  • Hackable Dioramas
  • -
  • Red vs Blue real-life scenarios
  • -
  • Industrial control systems
  • -
  • Real time visuals
  • -
  • Real time scoreboards
  • -
- -
- -
- -
- -
- -
- - -
- -
- -
- -
- -
- LAB -
- -
- - - -
- -

Lab

- - -
 
- - - -
- - -
    -
  • Customized to course specifications
  • -
  • Multiple training subjects
  • -
  • Hands on experience on real-life scenarios
  • -
  • Exam/Test platform
  • -
  • Latest vulnerabilities updates
  • -
- -
- -
- -
- -
- -
- - -
- -
- -
- -
- -
- SIMULATIONS -
- -
- - - -
- -

Simulations

- - - -
 
- - - -
- - -
    -
  • Drill and readiness simulations
  • -
  • Skill sharpening exercises
  • -
  • Warfare exercises
  • -
  • Defensive / offensive real life scenarios
  • -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- ASSESSMENT -
- -
- - - -
- -

Assessment

- - - -
 
- - - -
- - -
    -
  • Cybersecurity assessment
  • -
  • Application assessment
  • -
  • Candidate testing
  • -
  • Employee evaluation
  • -
  • QA gamification
  • -
- -
- -
- -
- -
- -
- -
- -
- -
- - - - - - -
- -
- -
- -
- -
-
- -
- -
- -
- - - -
-
-
-
-
- -
-
- -
- - YOU ARE UNIQUE -
- - - -
- -
- -

YOU ARE UNIQUE

-
- - - -
- -

Every installation is different and inline with your business market and needs

-

- -
- -
- -
- -
- -
- -
- -
- - -
-
-
- -
-
- -
- - YOU MATTER TO US -
- - - -
- -
- -

YOU - MATTER TO US

-
- - - -
- -

- Your opinions and suggestions are what keep us innovating -

- -
- -
- -
- -
- -
- -
- -
- -
- -
- - - -
- - - - - - - - - - - - - - - - -
- -
- - - - - - - -
-
-
-
- -
- -
- -
- More than 1000 exercises -
- - - -
- - - -
- -

1000+

- - - -
EXERCISES
- -
- -
- - - -
- -
- - More than 200 hackable electronic elements -
- - - -
- - - -
- -

200+

- - - -
ELECTRONIC ELEMENTS
- -
- -
- - - -
- -
- More than 200 applications - -
- - - -
- - - -
- -

500+

- - - -
APPLICATIONS
- -
- -
- - - -
- -
- More than 500 concurrent participants -
- - - -
- - - -
- -

10000+

- - - -
PARTICIPANTS
- -
- -
- -
- -
- -
- -
- -
- - - -
-
-
- - -
- -

FEATURES

- - - -
- -
- -
- - - -
- -
- - - -
-
- -
- - - -
- - - -
- -
- -

Hackable dioramas

- -
- - - -
- -

- -
- -
- -
- -
- - - -
-
- -
- - - -
- - - -
- -
- -

Industrial control systems exercises

- -
- - - -
- -

- -
- -
- -
- -
- - -
-
- -
- - - -
- - - -
- -
- -

Smart cities exercises

- -
- - - -
- -

- -
- -
- -
- -
- - -
- - -
- -
-
- - echoCTF Features - - - -
- - -
-
- -
- - -
- -
- - - -
-
- -
- - - -
- - - -
- -
- -

Attack/defense scenarios

- -
- - - -
- -

- -
- -
- -
- -
- - -
-
- -
- - - -
- - - -
- -
- -

Real time visuals

- -
- - - -
- -

- -
- -
- -
- -
- - - -
-
- -
- - - -
- - - -
- -
- -

Player's dashboards

- -
- - - -
- -

- -
- -
- -
- -
- -
- -
- -
- -
- - - -
-
-
- -
- -

PORTFOLIO

-

Check out some of our most distinctive work

- - - -
- -
-
- -
-
-
- - -
-
-
-
-

Digital Pakistan Cybersecurity Hackathon 2021

-
- - An onsite CTF competition was developed and run for Pakistan's 1st Nationwide Digital Cybersecurity Hackathon for professionals and students. - The competition was held by Pakistan's Ministry of IT & Telecom and Ignite. The competition consisted of three preliminary rounds that took place in three of Pakistan’s - major cities (Lahore, Karachi, and Islamabad) and a final round that was executed in Islamabad. - - The teams competed in five categories including network exploitation, operating systems exploitation, speed programming, application & web exploitation and mobile - device exploitation. - - The scope of the competition was to create a common base for cooperation between member states, information sharing, and discussions on current cybersecurity issues, - as well as to provide hands-on experience to national cybersecurity resources. - -

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Leaderboards

- -
-
-
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Simultaneous attacks in finals

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Finals in Islamabad

- -
-
-
- - -
- -
-
-
- -
- - - - - -
-
-
-
-

HackMex 2021

-
- - Another successful HackMex CTF event took place in October 2021. HackMex CTF gained so much traction in the last two years that participants from all - over the world asked to participate. So this year we had an amazing twist. It was the first year that the private sector was allowed to compete in the event so - there were three different competition categories with separate scoreboards and activity streams: students, private sector and government agencies. - - This year’s challenges incorporated real life attack and defense scenarios in a simulated Smart City environment as well as different jeopardy challenges such as - forensics, reverse engineering, binary analysis, incident investigation and more. - - As the organisers stated, apart from the lessons learned throughout this event, this year gave the opportunity for the academia, government and private sector to - cooperate, strengthen their social ties and productivity and prove that cybersecurity works best when sharing good practices and embrace teamwork. - -

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

HackMex2021 Flyer

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Mobile Activity Stream

- -
-
-
- -
-
-
- -
- -
- - - -
-
-
-
-

EESTech Challenge Athens/Thessaloniki 2021

-
- - A non-profit CTF competition was developed for this year's national EESTech Challenge for both EETech LC Athens and LC Thessaloniki. - The participants competed in teams, claiming the qualification to the final round of Europe, which took place in Belgrade. The participants battled in a mixed - style CTF with challenges of varying difficulty which included topics such forensics, reverse engineering, network and operating systems exploitation, - incident investigation and many more. - -

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

EESTech Athens Flyer

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

EESTech Thessaloniki Flyer

- -
-
-
- -
-
-
- -
- -
- - - -
-
-
-
-

HackMex 2020

-
- - For the second consecutive year we developed the HackMex CTF for the Instituto - Politécnico Nacional of Mexico. This year’s challenges included digital - forensics, reverse engineering, binary analysis, vulnerability identification, incident investigation and more. - - The participants were divided into 2 categories, the Academics and the - .GOB & .ORG. Each of the categories had separate leaderboards and - activity streams. - - The participants included university students from all around Mexico as - well as government, military and intelligence services. -

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Academic leaderboard

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Visuals from attacks

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

.GOB Leaderboards

- -
-
-
- -
-
-
- -
- -
- - - - - -
-
-
-
-

HackMex 2019

-
- -An online CTF competition was developed for the Instituto Politécnico Nacional -of Mexico. The tournament was held by The National Polytechnic Institute (IPN). -The scope of HackMex 2019 was to measure the technological capacity of Mexico, -in an academic environment with international projection. The competition -attracted not only students from different universities, but also cyber -security professionals, making it the largest CTF competition in the country. -Due to high demand, the competition was completed in two stages, the -qualification round and finals. The event gained national media attention. -

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Competition area

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Happy Teams

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Another view of the CTF Area

- -
-
-
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Network visuals provided by echoCTF

- -
-
-
- - -
-
-
- -
- -
- - - -
-
-
-
-

Cyber Sabers Hackathon - MENA ISC 2019

-
- For the third year in a row, we delivered an echoCTF based competition - for the Cyber Sabers Hackathon. The competition took place during the - two days of the MENA ISC 2019 Security Conference held in Riyadh, KSA. - This year we included even more challenges and flags that represented - the latest security trends of 2019. We also added more defensive - challenges to test how the participants act in real life situations. -

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

View of the diorama

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Construction site, Car parking

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Airport departures

- -
-
-
- -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

A closer view of the diorama

- -
-
-
- -
- -
- -
- -
- -
- -
- - - - - - -
-
-
-
-

IDEX 2019

-
- - A demonstration platform, created for one of our clients for the needs of the IDEX 2019, - which perfectly demonstrates the diversity of our platform. This military themed platform - is comprised of echoCTF targets and a diorama specifically tailored to illustrate the effects - of security lapses on modern military facilities. A presenter attacks and takes control of - systems (echoCTF targets) of the military facility which control various infrastructure - elements of the diorama through real-life services. The attacks result in opening the automated - hangar doors, take control of a UAV, bypass authorization checks on gates and more. -

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

View of the diorama

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

View of the drone control room

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

The automated drone hangar

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

The fuel station

- -
- -
- -
-
- -
- -
- -
- - -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

View of the display inside the base HQ

- -
- -
- -
-
- -
- -
- - - - - -
- - - -
-
-
-
-

Cyber Sabers Hackathon - MENA ISC 2018

-
- - For the second year in a row, Echothrust Solutions was tasked to - deliver an echoCTF based competition for the Cyber Sabers Hackathon. The competition took - place during the two days of the MENA ISC 2018 and included 36 teams and 153 participants. - This year, we included even more custom made models of signature buildings of Riyadh, Jeddah, - Kuwait and Dubai. Besides the usual offensive challenges, programming and defensive challenges - were also developed. The top scoring teams were awarded with prizes of 50,000 to 20,000 SAR and - every participant was awarded with a certificate of participation.

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

View of the CTF Hall

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

View of the echoCiTy-F model city

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

A closer view of echoCiTy-F

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Our support team in action

- -
- -
- -
-
- -
- -
- -
- - -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

The smart farm of echoCiTy-F

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

The Oil factory and Solar plant

- -
- -
- -
-
- -
- -
- - - - - -
- - - - -
-
-
- -
-

ENISA "Hack the Airport" at Cyber Europe 2018

-
- - European Network and Information Security Agency (ENISA EU Agency) "Hack the Airport" - concept includes airport infrastructure CTF scenarios which are visualized through a scaled - model of an airport. ENISA Hack the airport is utilized as part of the 5th pan European cyber - crisis exercise, Cyber Europe 2018 (CE2018). The scenarios include obtaining control of a jet - bridge, the radar, a moving walkway, the departures board and more. -

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Close view of the transfers hall

- -
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

A closer view of departures hall

-
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

View of the jet bridge and departures hall

-
- -
- -
-
-
- - -
- -
- -
- - - - - - -
- - - -
-
-
-
-

MENA ISC 2017

-
- - As part of the MENA ISC 2017, a Hackathon competition took place and students of - more than 10 Universities across KSA (Saudi Arabia) participated. This - time, amongst other elements usually included on echoCiTy-F, - custom made models of signature buildings of the city of Riyadh were constructed. - Along with other challenges on information systems and infrastructure elements, aspects - of the custom made buildings could also be controlled like the elevator and lights - of the Kingdom Tower and lights of the Burj Rafal tower. The top four point scoring - teams were awarded with prizes of 50,000 to 20,000 SAR and certificates of participation.

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Full view of the model city

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Oil Pumps of the MENA ISC 2017 echoCiTy-F model city

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

The custom made model buildings of Riyadh

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

During the Hackathon

- -
- -
- -
-
- -
- -
- - -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

A closer look

- -
- -
- -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Attempted attack on the airport terminal display

- -
- -
- -
-
- -
- -
- - - -
- - - - - -
- - - -
-
-
- - -
-

DU HACKATHON 2016

-
- - - Echothrust Solutions created from scratch, a smart - city model, the echoCiTy-F, which represents vital - infrastructure components of a smart city - including ICS and SCADA - systems for transportation, energy, communications and - construction. The gameplay was visible to the players and public - through computer generated visualisations. Amongst other challenges, - hackers tried to obtain control of a model train, its rail tracks and - the train passage bars, the lights and ventilation of a train tunnel, - the airport's communication tower, a power plant and a nuclear plant, - wind turbines and more. echoCTF's gameplay was designed - to assess students knowledge and skills and educate them on cyber security - and ethical hacking. The team with the highest points at the end won - the competition, taking home the prize of AED 20,000 and certificates - of participation.

-
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Rocket Launcher protecting the Industrial section of the DU Hackathon 2016 echoCiTy-F model city.

- -
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Night view of train station view of the DU Hackathon 2016 echoCiTy-F model city

-
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Closer view of the model city

-
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

The hall

-
- -
- -
- -
- -
- - -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

Visual representation of network traffic

- - - -
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

1st place winners

- - -
- -
- -
- - - -
- -
- -
- - -
- -
- -
- -
- - - -
-
-
- - -
- -

DU HACKATHON 2014

-
- - -
-
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

DU Hackathon 2014 - Dubai

- -
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

DU Hackathon 2014 - Dubai

- -
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

DU Hackathon 2014 - Dubai

- - -
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

DU Hackathon 2014 - Dubai

-
- -
- -
- -
- -
- - -
-
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

DU Hackathon 2014 - Dubai

- - - -
- -
- -
- - -
- -
- -
- - - - - - pic - - -
- -
- - -
- -
- -
- - - -
- -

DU Hackathon 2014 - Dubai

- - -
- -
- -
- - - -
- -
- -
- - - -
- -
- - - -
- - -
-
-
-
- - -
- -

WHO WE ARE

- - - -
- -
- -
-
- -
-
-
- Who we are -
-
-

What we do

-

Over the past 15 years, we have been delivering cybersecurity projects for government agencies, military, - large corporations and educational institutions.
- - Expanding upon this demonstrated establishment, we have created solutions - that bring cybersecurity exercises to the next generation of cybersecurity training.

- -
-
-
- -
-
-
- what makes us different -
-
-

What makes us different

-

We are the pioneers in delivering real life cybersecurity exercises that are accompanied by - hackable smart city dioramas, cascading effects and advanced visualisation techniques.

- - We believe in the community and we are trying to give back to it by creating OpenSource code.

- -
-
-
- - -
-
-
- Who we serve -
-
-

Who we serve

-

We work with businesses, educational institutes, government agencies and the military around the world.


- - We can design any cybersecurity exercise you demand. Just tell us your requirements. - -
-
-
- - -
- - -
-
- - -
-
-
-
- -
- -

Get in touch

-
- -
- - -
- Address -

- -
-

ADDRESS:
- Echothrust Solutions
- Ippodamias Sq. 8
- Piraeus, 18531
- Greece -

-
- -
- - -
- Address
-

- -
-

EMAIL:
- Request for proposal:
- sales@echothrust.com
-

-

General Inquiries:
- info@echothrust.com
-

-
- -
- - -
- -
- - - -
- -
- - - - - - - - - - - TOP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + +Welcome to echoCTF.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ + + + + + +
+ +
+ + + + +
+ + +
+ + +
+ + + +
+ +
+ + +
+ +
+ + + +
+
+ + + +
+ +
+ +

+ + + +

+ Welcome to the innovation of cybersecurity exercises +

+ + + + + + + +
+ + MORE DETAILS +
+ +
+ +
+ +
+ + + +
+ +
+ + + +
+
+ + + +
+ +
+ +

+ + + + +

+ Over 200 hackable elements +

+ + + + +

We build fully functional hackable smart city dioramas to accompany our exercises

+ + + +
+ + MORE DETAILS +
+ +
+ +
+ +
+ + + + +
+ +
+ + + +
+
+ + + +
+ +
+ +

+ + + + +

+ Hackable public transportation +

+ + + + +

Gain access to trains, buses, airplanes

+ + + +
+ + MORE DETAILS +
+ +
+ +
+ +
+ + + +
+ +
+ + + +
+
+ + + +
+ +
+ +

+ + + +

+ Compromise road safety +

+ + + +

Attack traffic signals, street lights, digital signs

+ + + +
+ + LEARN MORE +
+ +
+ +
+ +
+ + + +
+ +
+ + + +
+
+ + + +
+ +
+ +

+ + + +

+ Real life scenarios for airport operations +

+ + + +

Hack the airplanes, terminals, departures/arrivals, control tower

+ + + +
+ + LEARN MORE +
+ +
+ +
+ +
+ + + + +
+ +
+ + + +
+
+ + + +
+ +
+ +

+ + + +

+ Real world scenarios for military operations +

+ + + +

Hack military control rooms, radars, missiles and more

+ + + +
+ + LEARN MORE +
+ +
+ +
+ +
+ + + +
+ +
+ + + +
+
+ + + +
+ +
+ +

+ + + + +

+ Hackable energy and water plants +

+ + + + +

Gain access to power plants, solar farms, oil refineries, water treatment plants

+ + + +
+ + LEARN MORE +
+ +
+ +
+ +
+ + + +
+ +
+ + + +
+
+ + + +
+ +
+ +

+ + + + +

+ Hackable public and private services +

+ + + + +

Gain access to hospitals, police stations, banks, telecoms and more

+ + + +
+ + LEARN MORE +
+ +
+ +
+ +
+ + + +
+ +
+ + + +
+
+ + + +
+ +
+ +

+ + + +

+ Want to try our platform? +

+ + + +

Join online for free at echoCTF.RED

+ + + +
+ + MORE DETAILS +
+ +
+ +
+ +
+ + +
+ + + +
+ + + + + +
PREV
+ +
+ + + +
+ + + + + +
NEXT
+ +
+ +
+ + + +
+
+ +
+ + +
+ + +
+ + +
+ + +
+ +
+ + +
+ + +
+ +
+ + + +
+
+
+
+
+
+
+
+ +

+ Do you want to be a part of this world? + +

+ + +

Give us your requirements and we will create a solution just for you.

+ +
+ + + + +
+ +
+ +
+ +
+ +
+ +
+ +
+ + + + +
+
+
+
+ +
+ +
+

echoCTF

+ +

How cybersecurity training should be

+ +
+ +
+ +
+ + + +
+ + +
+ +
+ + +
+
+ +
+ +
+ +
+ +
+ Real life systems +
+ +
+ + + +
+ +

Real life systems

+ + + +
+

Special crafted systems with attack and defence scenarios that are accurate and representative examples + of current security threats employed by exploits, trojans and malware found in the wild

+
+ + + +
+ + + +
    + +
+ +
+ +
+ +
+ +
+ +
+ + +
+ +
+ +
+ +
+ +
+ Hackable Dioramas +
+ +
+ + + +
+ +

Hackable Dioramas

+ + + +
+

Fully functional and hackable smart city dioramas are added to our exercises to promote a deeper way + of understanding the effects of real life cyber attacks

+
+ + + +
+ + + +
    + +
+ +
+ +
+ +
+ +
+ +
+ + +
+ +
+ +
+ +
+ +
+ Element of fun +
+ +
+ + + +
+ +

Element of fun

+ + + +
+

echoCTF exercises are in the form of a capture the flag game in order to make training more interesting and fun

+
+ + + +
+ + + +
    + +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ + + +
+
+
+
+ +
+ +

SERVICES

+ + + +
+ +
+ +
+ +
+ + +
+ +
+ +
+ +
+ +
+ CTFs +
+ +
+ + + +
+ +

CTFs

+ + +
 
+ + + +
+ + +
    +
  • Hackable Dioramas
  • +
  • Red vs Blue real-life scenarios
  • +
  • Industrial control systems
  • +
  • Real time visuals
  • +
  • Real time scoreboards
  • +
+ +
+ +
+ +
+ +
+ +
+ + +
+ +
+ +
+ +
+ +
+ LAB +
+ +
+ + + +
+ +

Lab

+ + +
 
+ + + +
+ + +
    +
  • Customized to course specifications
  • +
  • Multiple training subjects
  • +
  • Hands on experience on real-life scenarios
  • +
  • Exam/Test platform
  • +
  • Latest vulnerabilities updates
  • +
+ +
+ +
+ +
+ +
+ +
+ + +
+ +
+ +
+ +
+ +
+ SIMULATIONS +
+ +
+ + + +
+ +

Simulations

+ + + +
 
+ + + +
+ + +
    +
  • Drill and readiness simulations
  • +
  • Skill sharpening exercises
  • +
  • Warfare exercises
  • +
  • Defensive / offensive real life scenarios
  • +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ ASSESSMENT +
+ +
+ + + +
+ +

Assessment

+ + + +
 
+ + + +
+ + +
    +
  • Cybersecurity assessment
  • +
  • Application assessment
  • +
  • Candidate testing
  • +
  • Employee evaluation
  • +
  • QA gamification
  • +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ + + + + + +
+ +
+ +
+ +
+ +
+
+ +
+ +
+ +
+ + + +
+
+
+
+
+ +
+
+ +
+ + YOU ARE UNIQUE +
+ + + +
+ +
+ +

YOU ARE UNIQUE

+
+ + + +
+ +

Every installation is different and inline with your business market and needs

+

+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ + +
+
+
+ +
+
+ +
+ + YOU MATTER TO US +
+ + + +
+ +
+ +

YOU + MATTER TO US

+
+ + + +
+ +

+ Your opinions and suggestions are what keep us innovating +

+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ + + +
+ + + + + + + + + + + + + + + + +
+ +
+ + + + + + + +
+
+
+
+ +
+ +
+ +
+ More than 1000 exercises +
+ + + +
+ + + +
+ +

1000+

+ + + +
EXERCISES
+ +
+ +
+ + + +
+ +
+ + More than 200 hackable electronic elements +
+ + + +
+ + + +
+ +

200+

+ + + +
ELECTRONIC ELEMENTS
+ +
+ +
+ + + +
+ +
+ More than 200 applications + +
+ + + +
+ + + +
+ +

500+

+ + + +
APPLICATIONS
+ +
+ +
+ + + +
+ +
+ More than 500 concurrent participants +
+ + + +
+ + + +
+ +

10000+

+ + + +
PARTICIPANTS
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ + + +
+
+
+ + +
+ +

FEATURES

+ + + +
+ +
+ +
+ + + +
+ +
+ + + +
+
+ +
+ + + +
+ + + +
+ +
+ +

Hackable dioramas

+ +
+ + + +
+ +

+ +
+ +
+ +
+ +
+ + + +
+
+ +
+ + + +
+ + + +
+ +
+ +

Industrial control systems exercises

+ +
+ + + +
+ +

+ +
+ +
+ +
+ +
+ + +
+
+ +
+ + + +
+ + + +
+ +
+ +

Smart cities exercises

+ +
+ + + +
+ +

+ +
+ +
+ +
+ +
+ + +
+ + +
+ +
+
+ + echoCTF Features + + + +
+ + +
+
+ +
+ + +
+ +
+ + + +
+
+ +
+ + + +
+ + + +
+ +
+ +

Attack/defense scenarios

+ +
+ + + +
+ +

+ +
+ +
+ +
+ +
+ + +
+
+ +
+ + + +
+ + + +
+ +
+ +

Real time visuals

+ +
+ + + +
+ +

+ +
+ +
+ +
+ +
+ + + +
+
+ +
+ + + +
+ + + +
+ +
+ +

Player's dashboards

+ +
+ + + +
+ +

+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ +
+ + + + +
+
+
+ +
+

PORTFOLIO

+

Check out some of our most distinctive work

+
+
+
+ + + +
+ + +
+
+ HackMex 2019 +
+

HackMex 2019–2024

+

One of our longest-running collaborations — a multi-sector CTF with IPN Mexico that has grown into a national institution.

+ + + + +
+

HackMex is one of Latin America's most recognized cybersecurity competitions, organized annually by the Instituto Politécnico Nacional (IPN) and powered by echoCTF. What started as a one-time engagement in 2019 quickly evolved into a long-term partnership built on trust, innovation, and consistent delivery.

+

Each edition pushes the boundaries of cyber simulation — combining real-world attack scenarios with live visualizations, interactive experiences, and scalable multi-track infrastructure.

+
    +
  • 2024: Introduced interactive bomb defusal game for bystanders, boosting public engagement
  • +
  • 2023: Debuted a nuclear plant mini-diorama for visualizing ICS/SCADA threats
  • +
  • 2022: Scaled to 500 participants across 3 sectors (Academic, Government, Professionals) with qualification and final rounds
  • +
  • 2021: Maintained hybrid format due to pandemic, reinforcing resilience of the platform
  • +
  • 2020: Introduced dual-track setup for Academic and Government teams with separate dashboards
  • +
  • 2019: First event with IPN; massive media attention and national recognition
  • +
+ +
+
+ + CTF area + +

CTF Area

+
+
+ + 2019 competition area + +

Competition Area

+
+
+ + Visuals from attacks + +

Visuals From Attacks

> +
+
+ + Network visuals + +

Network Visuals

+
+
+ +
+ + +
+
+
+
+
+ + +
+
+ OffensiveX 2024 +
+

OffensiveX 2024

+

echoCTF's debut in Greece, featuring a hackable smart city diorama at Athens' premier cybersecurity conference.

+ + + + +
+

OffensiveX 2024 marked echoCTF's first event in Greece, held in Athens. The event showcased a hackable diorama of a modern city, providing participants with a hands-on experience in simulating cyberattacks on urban infrastructure.

+
    +
  • Interactive smart city diorama with critical infrastructure components
  • +
  • Live demonstrations of cyberattack simulations on urban systems
  • +
  • Engagement with international cybersecurity experts and enthusiasts
  • +
  • Integration of echoCTF's platform for real-time challenge execution
  • +
+ +
+
+ + OffensiveX competition area` + +

Smart City Diorama

+
+
+ + OffensiveX CTF participants + +

CTF Participants

+
+
+ + OffensiveX model city closeup + +

Model City Closeup

+
+
+ +
+ + +
+
+
+
+
+ + +
+
+ AfriHackBox 2024 +
+

AfriHackBox 2024

+

Part of echoCTF's growing presence in Africa. A high-energy, 24-hour live CTF in Nigeria.

+ + + + +
+

AfriHackBox 2024 was one of several African events powered by echoCTF, building momentum across the continent for ethical hacking and cyber readiness.

+
    +
  • 24-hour live CTF with over 160 participants
  • +
  • Featured a live “Headshot” mini challenge
  • +
  • Blended competition with community-building
  • +
+ +
+ + +
+
+
+
+
+ + +
+
+ brCTF 2023–2024 +
+

brCTF 2023–2024

+

Ghana’s flagship CTF series, powered by echoCTF. A blend of hacking, teamwork, and real-world challenge.

+ + + + +
+

brCTF (“Break The Code”) is Ghana’s premier national CTF series, co-organized with echoCTF. It combines digital and physical challenges in a 24-hour team-based format.

+
    +
  • Fully sponsored by Echothrust Solutions as part of our commitment to community and education
  • +
  • Finals hosted at Accra Digital Centre
  • +
  • Strong female participation and mentorship
  • +
  • Supported by echoCTF, OffSec, and local partners
  • +
+ +
+
+ + Hard Target + +

Hard Target

+
+
+ + Solving challenges + +

Solving Challenges

+
+
+ +
+ + +
+
+
+
+
+ + +
+
+ HackGDL 2024 +
+

HackGDL 2024

+

Guadalajara’s premier hacking festival. echoCTF powered the qualifiers for this vibrant, community-driven event.

+ + + + +
+

HackGDL 2024 brought together Mexico’s cybersecurity community for a weekend of hacking, learning, and collaboration. echoCTF developed and hosted the online qualifiers, setting the stage for an engaging main event.

+
    +
  • echoCTF platform provided as a full sponsorship to support early-stage talent in Mexico
  • +
  • Challenges in web, reverse, crypto, and forensics
  • +
  • Community-led with strong local partnerships
  • +
+ +
+
+ + HackGDL sponsors + +

HackGDL Sponsors

+
+
+ + Festive Atmosphere + +

Festive Atmosphere

+
+
+ +
+ + +
+
+
+
+
+ + +
+
+ Digital Pakistan Cybersecurity Hackathon 2021 +
+

Digital Pakistan Cybersecurity Hackathon 2021

+

Pakistan’s first nationwide cybersecurity competition. echoCTF powered the technical platform for all rounds.

+ + + + +
+

Digital Pakistan Cybersecurity Hackathon 2021 was a national initiative to foster cybersecurity talent across Pakistan. echoCTF developed and hosted the technical platform for all qualifying and final rounds.

+
    +
  • Regional rounds in Karachi, Lahore, and Islamabad
  • +
  • Finale held in Islamabad
  • +
  • Over 1,500 participants trained in pre-event workshops
  • +
  • Challenges included web, mobile, network, OS, and speed programming
  • +
+ +
+
+ + Simultaneous attacks in finals + +

Simultaneous Attacks In finals

+
+
+ + Leaderboard + +

Leaderboard

+
+
+ +
+ + +
+
+
+
+
+ + +
+
+ EESTech Challenge 2021 +
+

EESTech Challenge 2021

+

A European-wide student competition with national semifinals and a continental final.

+ + + + +
+

EESTech Challenge 2021 was a European cybersecurity competition organized by EESTEC, featuring local rounds in Athens and Thessaloniki. echoCTF delivered the CTF competition for the national rounds.

+
    +
  • Sponsored and hosted both Greek semifinal CTFs
  • +
  • Local rounds held in Athens and Thessaloniki
  • +
  • Teams competed in a mixed-style CTF format
  • +
  • Challenges included forensics, reverse engineering, and network exploitation
  • +
+ +
+
+ + EESTech 2021 Athens Flyer + +

EESTech 2021 Athens Flyer

+
+
+ +
+ + +
+
+
+
+
+ + +
+
+ MENA ISC & Cyber Sabers Hackathon +
+

Cyber Sabers Hackathon (2017–2019)

+

Three consecutive years of immersive CTF competitions at MENA ISC, powered by echoCTF.

+ + + + +
+

Cyber Sabers Hackathon was a flagship cybersecurity competition held during the MENA ISC conferences in Riyadh, Saudi Arabia. From 2017 to 2019, echoCTF provided the technical platform and interactive dioramas for these events.

+
    +
  • 2019: Expanded challenges reflecting latest security trends
  • +
  • 2018: 36 teams, 153 participants; introduced signature building models
  • +
  • 2017: Featured interactive models of Riyadh landmarks
  • +
  • Prizes ranged from 20,000 to 50,000 SAR for top teams
  • +
  • Participants received certificates of participation
  • +
+ +
+
+ + Construction Site and Car Parking + +

Construction Site

+
+
+ + Airport Departures + +

Airport Departures

+
+
+ + View of the Diorama + +

Diorama View

+
+
+ + CTF Hall View + +

CTF Hall View

+
+
+ + echoCTF Model City + +

echoCTF Model City

+
+
+ + Closer View of the Diorama + +

Closer View of the Diorama

+
+
+ + Smart Farm + +

Smart Farm

+
+
+ + Oil Factory and Solar Plant + +

Oil Factory and Solar Plant

+
+
+ + Attempted attack on the aiport terminal display + +

Attempted Attack

+
+
+ + echoCTF Fountain + +

echoCTF Fountain

+
+
+ + During the Event + +

During the Event

+
+
+ + The custom made model buildings of Riyadh + +

Model buildings of Riyadh

+
+
+ + Oil Pumps of the MENA ISC 2017 echoCiTy-F model city + +

2017 echoCiTy-F Oil Pumps

+
+
+ + Full view of the model city + +

2017 Model City

+
+
+ +
+ + +
+
+
+
+
+ + +
+
+ DarkMatter for IDEX 2019 +
+

DarkMatter for IDEX 2019

+

Cyberattack simulation for defense sector, live at the International Defence Exhibition in Abu Dhabi.

+ + + + +
+

IDEX 2019 featured a live demonstration platform developed by echoCTF, illustrating the impact of cyberattacks on military infrastructure through a custom-built diorama.

+
    +
  • Simulated cyberattacks on military control systems
  • +
  • Real-time control of diorama elements like UAVs and hangar doors
  • +
  • Demonstrated vulnerabilities in defense infrastructure
  • +
  • Interactive presentation for defense industry professionals
  • +
  • Showcased echoCTF's capabilities in military cybersecurity training
  • +
+ +
+
+ + Drone Control Room + +

Drone Control Room

+
+
+ + Automated Drone Hangar + +

Automated Drone Hangar

+
+
+ + Fuel Station + +

Fuel Station

+
+
+ + Inside the Base HQ + +

Inside the Base HQ

+
+
+ +
+ + +
+
+
+
+
+ + + +
+
+ ENISA 'Hack the Airport' at Cyber Europe 2018 +
+

ENISA "Hack the Airport" at Cyber Europe 2018

+

Interactive airport infrastructure CTF scenario developed for ENISA’s pan-European cyber crisis exercise.

+ + + + +
+

Cyber Europe 2018, organized by ENISA, featured the "Hack the Airport" scenario—a scaled model of an airport infrastructure used to simulate cyber-attacks on critical systems. echoCTF developed the technical platform enabling participants to interact with and exploit various airport components.

+
    +
  • Simulated control of jet bridges, radars, and moving walkways
  • +
  • Interactive departures board manipulation
  • +
  • Realistic airport environment for hands-on cybersecurity training
  • +
  • Part of the 5th pan-European cyber crisis exercise
  • +
  • Enhanced participant engagement through physical infrastructure
  • +
+ +
+
+ + Departures Hall + +

Departures Hall

+
+
+ + Transfers Hall + +

Transfers Hall

+
+
+ +
+ + +
+
+
+
+
+ + +
+
+ du Hackathon 2014 & 2016 +
+

du Hackathon 2014 & 2016

+

Introduced the world’s first CTF with a physical, hackable smart city diorama.

+ + + + +
+

du Hackathon marked the inception of echoCTF's physical diorama-based cybersecurity competitions, setting a new standard for interactive learning and engagement.

+
    +
  • 2016: echoCiTy-F expansion with over 200 hackable elements
  • +
  • 2014: Presentation of the first smart city diorama in a CTF competition
  • +
  • Simulated control over trains, power grids, airports, and more
  • +
  • Real-time visualizations for participants and spectators
  • +
  • Top team awarded AED 20,000 and participation certificates
  • +
+ +
+
+ + echoCiTy-F's Debut + +

echoCiTy-F's Debut

+
+
+ + Visuals from Attacks + +

Visuals from Attacks

+
+
+ + Explaining echoCiTy-F + +

Explaining echoCiTy-F

+
+
+ + du Hackathon 2014 Dubai + +

du Hackathon 2014 Dubai

+
+
+ + du Hackathon 2014 Diorama + +

du Hackathon 2014 Diorama

+
+
+ + Awarding echoCTF Team + +

Awarding echoCTF Team

+
+
+ + Network Traffic Visuals + +

Network Traffic Visuals

+
+
+ + 1st Place Winners + +

1st Place Winners

+
+
+ + 2016 Diorama + +

2016 Diorama

+
+
+ + Night View of echoCiTy-F + +

Night View of echoCiTy-F

+
+
+ + Construction Site + +

Construction Site

+
+
+ + Showcasing echoCTF + +

Showcasing echoCTF

+
+
+ +
+ + +
+
+
+
+
+ +
+
+ + + +
+
+
+
+ + +
+ +

WHO WE ARE

+ + + +
+ +
+ +
+
+ +
+
+
+ Who we are +
+
+

What we do

+

Over the past 15 years, we have been delivering cybersecurity projects for government agencies, military, + large corporations and educational institutions.
+ + Expanding upon this demonstrated establishment, we have created solutions + that bring cybersecurity exercises to the next generation of cybersecurity training.

+ +
+
+
+ +
+
+
+ what makes us different +
+
+

What makes us different

+

We are the pioneers in delivering real life cybersecurity exercises that are accompanied by + hackable smart city dioramas, cascading effects and advanced visualisation techniques.

+ + We believe in the community and we are trying to give back to it by creating OpenSource code.

+ +
+
+
+ + +
+
+
+ Who we serve +
+
+

Who we serve

+

We work with businesses, educational institutes, government agencies and the military around the world.


+ + We can design any cybersecurity exercise you demand. Just tell us your requirements. + +
+
+
+ + +
+ + +
+
+ + +
+
+
+
+ +
+ +

Get in touch

+
+ +
+ + +
+ Address +

+ +
+

ADDRESS:
+ Echothrust Solutions
+ Ippodamias Sq. 8
+ Piraeus, 18531
+ Greece +

+
+ +
+ + +
+ Address
+

+ +
+

EMAIL:
+ Request for proposal:
+ sales@echothrust.com
+

+

General Inquiries:
+ info@echothrust.com
+

+
+ +
+ + +
+ +
+ + + +
+ +
+ + + + + + +
+ + + + TOP + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +