Hackathon

Home » Content » Hackathon

Results of the competition

The CyberCamp 2018 Hackathon is over!

After 3 days of intense competition, the winners of the Hackathon are the following:

Posición Equipo Herramienta
S3curityBug GuardedBox: Web application for storage and sharing of secrets in real time, based on asymmetric encryption and without clear information transfer, with deployment as a cloud service.
Zel Stuk: secure SSH management, temporary or permanent, through Port Knocking mechanism and user authentication using 2FA, with single-use codes using physical U2F devices and applicable to IT infrastructures in the cloud or local.
UnicornTeam ASSAP (Anti Shoulder Surfing Attack Platform): detection and mitigation of shoulder surfing attacks, based on Machine Learning techniques, with generation of alerts and execution of actions before a detection.

 

The complete list of projects participating in the Hackathon is the following:

Equipo Herramienta
ABLEx Autenticador externo por BLE: users authentication in different services (e.g. computer unlocking, file system decryption...) based on the proximity of an external BLE device that works as a presence token.
CyberWatcher SSOP: platform for user authentication in any Internet service based on three methods: your mobile terminal, a code or pattern and fingerprint, checked against a centralized identity database.
IoT Vigilant IoT Vigilant: detection of anomalous behaviour of IoT devices by correlating sent packages and data from other similar devices, using Machine Learning techniques.
iSecurity Intelligent Security: intelligent system for monitoring and managing the state of security of an SME, based on Machine Learning, for maintaining an acceptable level of security without the need for high technical knowledge.
Lolcathost Enitsda: detection of intrusive devices in controlled locations based on their Wi-Fi and Bluetooth MAC addresses, using ESP32 devices as collectors and comparing the data with white/black lists.
Ontic Iuris: Web site audit tool to verify compliance with legislation such as the LOPD, RGPD and LSSI independently, without relying on third parties, and complemented with a guide of tips to comply with them.
Phish n Chips Fastphish: detection of domains used for phishing campaigns in their initial stage, using homography techniques and monitoring of Certificate Transparency logs.
S3curityBug GuardedBox: Web application for storage and sharing of secrets in real time, based on asymmetric encryption and without clear information transfer, with deployment as a cloud service.
T1GR3$ Airo-Heat: collect information about Wi-Fi access points and their clients, generate thermal maps and improvements for aircrack-ng, with relevant information for Wi-Fi pen-testings.
UnicornTeam ASSAP (Anti Shoulder Surfing Attack Platform): detection and mitigation of shoulder surfing attacks, based on Machine Learning techniques, with generation of alerts and execution of actions before a detection.
UVaNoobs BlueFingerprint: electronic lock system based on the trust relationship between the user's mobile device and an arduino, which will share an asymmetric pair of keys and use the fingerprint as a complement for validation.
Zel Stuk: secure SSH management, temporary or permanent, through Port Knocking mechanism and user authentication using 2FA, with single-use codes using physical U2F devices and applicable to IT infrastructures in the cloud or local.
ZEVENET TEAM Smart DDoS filter: detection of common DDoS attacks on the Internet (UDP Flood, ICMP Flood, SYN Flood, HTTP Flood, Ping of Dead...) based on nftlb (and nftables), using the particular data of published services to generate automatic and self-managed rules.
zionSpartans Wall-do: automatic detection, notification and mitigation of attacks from suspicious IPs based on log analysis, ensuring the distinction between a brute-force attack on different hosts and legitimate access attempts that have failed due to human error.

 

Congratulations to all for the level demonstrated and for your valuable projects. See you at CyberCamp 2019!

If you have any question, please contact with us via: h a c k a t h o n @ c y b e r c a m p . e s