diff --git a/images/portfolio-images/BRCTF2024/brctf_exhaustion.jpg b/images/portfolio-images/BRCTF2024/brctf_exhaustion.jpg new file mode 100644 index 0000000..e9a0dda Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_exhaustion.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_exhaustion_th.jpg b/images/portfolio-images/BRCTF2024/brctf_exhaustion_th.jpg new file mode 100644 index 0000000..3fe960f Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_exhaustion_th.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_participants.jpg b/images/portfolio-images/BRCTF2024/brctf_participants.jpg new file mode 100644 index 0000000..5bb7a59 Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_participants.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_participants_th.jpg b/images/portfolio-images/BRCTF2024/brctf_participants_th.jpg new file mode 100644 index 0000000..242f970 Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_participants_th.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_solving_challenges.jpg b/images/portfolio-images/BRCTF2024/brctf_solving_challenges.jpg new file mode 100644 index 0000000..b26529e Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_solving_challenges.jpg differ diff --git a/images/portfolio-images/BRCTF2024/brctf_solving_challenges_th.jpg b/images/portfolio-images/BRCTF2024/brctf_solving_challenges_th.jpg new file mode 100644 index 0000000..e028c68 Binary files /dev/null and b/images/portfolio-images/BRCTF2024/brctf_solving_challenges_th.jpg differ diff --git a/images/portfolio-images/HACKGDL.jpg b/images/portfolio-images/HACKGDL.jpg new file mode 100644 index 0000000..dacd64a Binary files /dev/null and b/images/portfolio-images/HACKGDL.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_festive.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_festive.jpg new file mode 100644 index 0000000..b9d4fe4 Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_festive.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_festive_th.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_festive_th.jpg new file mode 100644 index 0000000..9297264 Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_festive_th.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_pinata.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_pinata.jpg new file mode 100644 index 0000000..dacd64a Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_pinata.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_pinata_th.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_pinata_th.jpg new file mode 100644 index 0000000..e6019ed Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_pinata_th.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_sponsors.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_sponsors.jpg new file mode 100644 index 0000000..8142e99 Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_sponsors.jpg differ diff --git a/images/portfolio-images/HACKGDL2024/hackgdl_sponsors_th.jpg b/images/portfolio-images/HACKGDL2024/hackgdl_sponsors_th.jpg new file mode 100644 index 0000000..10c705d Binary files /dev/null and b/images/portfolio-images/HACKGDL2024/hackgdl_sponsors_th.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city.jpg b/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city.jpg new file mode 100644 index 0000000..9d58e6e Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city_th.jpg b/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city_th.jpg new file mode 100644 index 0000000..0c57cb8 Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/echoctf_model_city_th.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/model_city_closeup.jpg b/images/portfolio-images/OFFENSIVEX2024/model_city_closeup.jpg new file mode 100644 index 0000000..807bffd Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/model_city_closeup.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/model_city_closeup_th.jpg b/images/portfolio-images/OFFENSIVEX2024/model_city_closeup_th.jpg new file mode 100644 index 0000000..5802779 Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/model_city_closeup_th.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area.jpg b/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area.jpg new file mode 100644 index 0000000..ad3baff Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area_th.jpg b/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area_th.jpg new file mode 100644 index 0000000..5a77c77 Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/offensivex_competition_area_th.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants.jpg b/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants.jpg new file mode 100644 index 0000000..e0d6c05 Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants.jpg differ diff --git a/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants_th.jpg b/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants_th.jpg new file mode 100644 index 0000000..0c3af4d Binary files /dev/null and b/images/portfolio-images/OFFENSIVEX2024/offensivex_ctf_participants_th.jpg differ diff --git a/index.html b/index.html index 1c98a3d..bea6bab 100644 --- a/index.html +++ b/index.html @@ -1,4377 +1,2724 @@ - - -
- - - - - - - -
-
- Special crafted systems with attack and defence scenarios that are accurate and representative examples - of current security threats employed by exploits, trojans and malware found in the wild
-Fully functional and hackable smart city dioramas are added to our exercises to promote a deeper way - of understanding the effects of real life cyber attacks
-echoCTF exercises are in the form of a capture the flag game in order to make training more interesting and fun
-
-
-
-
-
-
- Over the past 15 years, we have been delivering cybersecurity projects for government agencies, military,
- large corporations and educational institutions.
-
- Expanding upon this demonstrated establishment, we have created solutions
- that bring cybersecurity exercises to the next generation of cybersecurity training.
- We are the pioneers in delivering real life cybersecurity exercises that are accompanied by
- hackable smart city dioramas, cascading effects and advanced visualisation techniques.
-
- We believe in the community and we are trying to give back to it by creating OpenSource code.
- We work with businesses, educational institutes, government agencies and the military around the world.
ADDRESS:
- Echothrust Solutions
- Ippodamias Sq. 8
- Piraeus, 18531
- Greece
-
EMAIL:
- Request for proposal:
- sales@echothrust.com
-
General Inquiries:
- info@echothrust.com
-
+
+ Special crafted systems with attack and defence scenarios that are accurate and representative examples + of current security threats employed by exploits, trojans and malware found in the wild
+Fully functional and hackable smart city dioramas are added to our exercises to promote a deeper way + of understanding the effects of real life cyber attacks
+echoCTF exercises are in the form of a capture the flag game in order to make training more interesting and fun
+
+
+
+
+
+
+ One of our longest-running collaborations — a multi-sector CTF with IPN Mexico that has grown into a national institution.
+ + + + +HackMex is one of Latin America's most recognized cybersecurity competitions, organized annually by the Instituto Politécnico Nacional (IPN) and powered by echoCTF. What started as a one-time engagement in 2019 quickly evolved into a long-term partnership built on trust, innovation, and consistent delivery.
+Each edition pushes the boundaries of cyber simulation — combining real-world attack scenarios with live visualizations, interactive experiences, and scalable multi-track infrastructure.
+
+
+ CTF Area
+
+
+ Competition Area
+
+
+ Visuals From Attacks
> +
+
+ Network Visuals
+
+ echoCTF's debut in Greece, featuring a hackable smart city diorama at Athens' premier cybersecurity conference.
+ + + + +OffensiveX 2024 marked echoCTF's first event in Greece, held in Athens. The event showcased a hackable diorama of a modern city, providing participants with a hands-on experience in simulating cyberattacks on urban infrastructure.
+
+ Part of echoCTF's growing presence in Africa. A high-energy, 24-hour live CTF in Nigeria.
+ + + + +AfriHackBox 2024 was one of several African events powered by echoCTF, building momentum across the continent for ethical hacking and cyber readiness.
+
+ Ghana’s flagship CTF series, powered by echoCTF. A blend of hacking, teamwork, and real-world challenge.
+ + + + +brCTF (“Break The Code”) is Ghana’s premier national CTF series, co-organized with echoCTF. It combines digital and physical challenges in a 24-hour team-based format.
+
+ Guadalajara’s premier hacking festival. echoCTF powered the qualifiers for this vibrant, community-driven event.
+ + + + +HackGDL 2024 brought together Mexico’s cybersecurity community for a weekend of hacking, learning, and collaboration. echoCTF developed and hosted the online qualifiers, setting the stage for an engaging main event.
+
+ Pakistan’s first nationwide cybersecurity competition. echoCTF powered the technical platform for all rounds.
+ + + + +Digital Pakistan Cybersecurity Hackathon 2021 was a national initiative to foster cybersecurity talent across Pakistan. echoCTF developed and hosted the technical platform for all qualifying and final rounds.
+
+ A European-wide student competition with national semifinals and a continental final.
+ + + + +EESTech Challenge 2021 was a European cybersecurity competition organized by EESTEC, featuring local rounds in Athens and Thessaloniki. echoCTF delivered the CTF competition for the national rounds.
+
+
+ EESTech 2021 Athens Flyer
+
+ Three consecutive years of immersive CTF competitions at MENA ISC, powered by echoCTF.
+ + + + +Cyber Sabers Hackathon was a flagship cybersecurity competition held during the MENA ISC conferences in Riyadh, Saudi Arabia. From 2017 to 2019, echoCTF provided the technical platform and interactive dioramas for these events.
+
+
+ Construction Site
+
+
+ Airport Departures
+
+
+ Diorama View
+
+
+ CTF Hall View
+
+
+ echoCTF Model City
+
+
+ Closer View of the Diorama
+
+
+ Smart Farm
+
+
+ Oil Factory and Solar Plant
+
+
+ Attempted Attack
+
+
+ echoCTF Fountain
+
+
+ During the Event
+
+
+ Model buildings of Riyadh
+
+
+ 2017 echoCiTy-F Oil Pumps
+
+
+ 2017 Model City
+
+ Cyberattack simulation for defense sector, live at the International Defence Exhibition in Abu Dhabi.
+ + + + +IDEX 2019 featured a live demonstration platform developed by echoCTF, illustrating the impact of cyberattacks on military infrastructure through a custom-built diorama.
+
+
+ Drone Control Room
+
+
+ Automated Drone Hangar
+
+
+ Fuel Station
+
+
+ Inside the Base HQ
+
+ Interactive airport infrastructure CTF scenario developed for ENISA’s pan-European cyber crisis exercise.
+ + + + +Cyber Europe 2018, organized by ENISA, featured the "Hack the Airport" scenario—a scaled model of an airport infrastructure used to simulate cyber-attacks on critical systems. echoCTF developed the technical platform enabling participants to interact with and exploit various airport components.
+
+ Introduced the world’s first CTF with a physical, hackable smart city diorama.
+ + + + +du Hackathon marked the inception of echoCTF's physical diorama-based cybersecurity competitions, setting a new standard for interactive learning and engagement.
+
+
+ echoCiTy-F's Debut
+
+
+ Visuals from Attacks
+
+
+ Explaining echoCiTy-F
+
+
+ du Hackathon 2014 Dubai
+
+
+ du Hackathon 2014 Diorama
+
+
+ Awarding echoCTF Team
+
+
+ Network Traffic Visuals
+
+
+ 1st Place Winners
+
+
+ 2016 Diorama
+
+
+ Night View of echoCiTy-F
+
+
+ Construction Site
+
+
+ Showcasing echoCTF
+
+ Over the past 15 years, we have been delivering cybersecurity projects for government agencies, military,
+ large corporations and educational institutions.
+
+ Expanding upon this demonstrated establishment, we have created solutions
+ that bring cybersecurity exercises to the next generation of cybersecurity training.
+ We are the pioneers in delivering real life cybersecurity exercises that are accompanied by
+ hackable smart city dioramas, cascading effects and advanced visualisation techniques.
+
+ We believe in the community and we are trying to give back to it by creating OpenSource code.
+ We work with businesses, educational institutes, government agencies and the military around the world.
ADDRESS:
+ Echothrust Solutions
+ Ippodamias Sq. 8
+ Piraeus, 18531
+ Greece
+
EMAIL:
+ Request for proposal:
+ sales@echothrust.com
+
General Inquiries:
+ info@echothrust.com
+