Cyber Security Hackathon

Welcome to the Cyber Security Hackathon, hosted by E-Cell NIT Agartala in collaboration with IICES and DIT! Set in an immersive environment, this hackathon will test your skills, creativity, and resilience as you confront real-world cybersecurity problems head-on. Whether you‘re a coder, an ethical hacker, or a tech enthusiast, join us to innovate, collaborate, and showcase your expertise. Gear up to learn from industry leaders, gain hands-on experience, and compete for exciting rewards. Are you ready to stand at the frontline of the digital world? Step up and make your mark in the cyber security.

PS-1: Decrypting the Caesar Cipher

Problem statement

Can you decrypt intercepted messages encoded with the Caesar Cipher to uncover clues about potential attackers‘ strategies and timelines?

Expected Outcome

Reverse-engineer the Caesar Cipher to decrypt intercepted messages.
Make an extention which decrypt messages along with insights into attackers‘ intentions.
Demonstrate comprehension of classic encryption and decryption techniques.
Provide analysis of clues related to potential attackers‘ strategies and timelines.

PS-2: Examination of a Keystroke Logger

Problem statement

How can you detect and analyze the functionality of a keystroke logger and develop mechanisms to prevent it from stealing sensitive information?

Expected Outcome

Prepare a method which analyze the structure and operation of a simulated keystroke logger.
Identify methods by which the logger infiltrates systems and records keystrokes.
Develop to counteract malware and prevent data theft and present detection and mitigation strategies for keystroke logging.

PS-3: Network Packet Sniffing and Protection

Problem statement

How can you identify vulnerabilities in network communications and implement protective measures to prevent unauthorized access and data interception?

Expected Outcome

Perform packet sniffing and analyze unencrypted network traffic.
Identify vulnerabilities in network communications and data transmission.
Implement security protocols, including encryption and firewall rules. •Demonstrate capability to secure network integrity and protect sensitive data.

PS-4: Developing Defenses Against SQL Injection

Problem statement

What methods can you implement to secure a web application’s database against SQL injection attacks?

Expected Outcome

Investigate SQL injection vulnerabilities in web applications.
Simulate SQL injection attack scenarios to understand potential risks.
Design and present defenses to secure the database.
Ensure database confidentiality and integrity for secure data management.