Pantelis Roditis's blog

Cyber Sabers 2019 Support & Development

Cyber Sabers Hackathon Logo

For the third year in a row, we delivered an echoCTF based competition for the Cyber Sabers Hackathon 2019. Cyber Sabers Hackathon is considered one of the most important competitions in the Saudi Arabia's region and is a part of the MENA ISC security conference.

The two day event invited students from both public and private KSA universities to participate in a dynamic CTF challenge in order to apply what they learned and gain new and hands-on experiences.

HackMex 2019 CTF Support & Development

HackMex CTF 2019
For the first time we delivered an echoCTF based competition in Mexico. HackMex is a yearly CTF competition that is organised by the Instituto Politécnico Nacional of Mexico.

Our goal for HackMex 2019 was to deliver an online CTF competition for university students to measure the technological capacity of Mexico, in an academic environment with international projections. But the event grew so much attention that eventually teams from universities as well as professionals were accepted to participate.

echoCTF.RED is now online

echoCTF.RED Logo

We are excited to announce our online platform to help you train and expand your cybersecurity offense and defense skills, echoCTF.RED

Echothrust Solutions has been delivering Capture the Flag competitions and cybersecurity exercises based on the echoCTF framework for the past seven years.

echoCTF throughout the years…

echoCTF throughout the years...
With 2017 just around the corner we thought it would be a good idea to introduce one of the projects we've been working on for the past 5 years, echoCTF.

Our CTF competition platform, echoCTF, was initially developed in order to run the CTF competition of AthCon 2012.

Since then, echoCTF has improved and grown immensely as it was utilized on subsequent events.

Keep reading to learn more about the echoCTF project and its history.

Using OpenBGPD to distribute pf table updates to your servers

OpenBGP+PFOne of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time.

This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.

The following post outlines one a method of distributing such lists using OpenBGP to deliver them into your pf tables.