DefCamp Capture the Flag (D-CTF) 2019

DefCamp Capture The Flag ( D-CTF) is the most shattering and rebellious security CTF competition in the Central Eastern Europe.

Here, the most skilled hackers & IT geeks put their knowledge to the test and compete with the best CFT teams from all over the world to get in the shortlist of best top 10, and later on win the overall D-CTF competition or, die trying.

There is one important rule though – hack before being hacked!

What is a Capture the Flag (CTF) event?

Capture the Flag (CTF) is a computer security competition. CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world.

Reverse-engineering, network sniffing, protocol analysis, system administration, programming, and cryptanalysis are all skills which have been required by prior CTF contests.

There are two main styles of capture the flag competitions: attack/defense and jeopardy. In an attack/defense style competition, each team is given a machine (or small network) to defend on an isolated network. Teams are scored on both their success in defending their assigned machine and on their success in attacking other team’s machines.

Depending on the nature of the particular CTF game, teams may either be attempting to take an opponent’s flag from their machine or teams may be attempting to plant their own flag on their opponent’s machine. One of the more prominent attack/defense CTFs is held every year at the hacker conference such as DefCamp where this activity is expected every year.

Goal of the Competition

/ You receive a number of challenges from different categories

/ Your goal is to exploit weaknesses in the systems provided by the organizers or follow hints available in the challenge description about what you need to discover

/ each challenge has an unique flag in the format DCTF{sha256 random message}; if found, you can submit into our platform and get rewarded

Rules of Engagement

/ Teams can have maximum 5 members (including Team Leader)

/ Denial of D-CTF’s infrastructure is forbidden

/ Finding bugs in D-CTF infrastructure can bring more points to the team

/ The most important rule though is hack before getting hacked!

/ Anyone can participate in this competition at the Qualification Phase

/ Best teams will qualify in the final which always happens during DefCamp

/ D-CTF has an online qualifications phase that last for 24 hours and best 10-15 teams from this round will qualify for the finals that will happen in Bucharest, Romania

/ The problems are challenging, unique and contain real life scenarios inspired from latest threats in different fields such as: AI & Machine Learning, Cyber War, Cryptography, Steganography, Web Security, Network Security, Data Forensics, Reverse Engineering, Blockchain, Exploitation, Incident Response and many more.

Scoring

/ First 3 teams that solve a challenge receive bonus points as follows: 1st place: +30 points, 2nd place: +20 points and 3rd place: +10 points

/ All other teams receive the number of points the challenge has

/ The number of points for any challenge (except Warmup) are computed dynamically based on the number of solvers; this means that the more teams are solving a challenge, the lower the value is

/ if two or more teams are equally at the end of the competition, the differentiation is being computed based on timestamp of the team who reach the score first

Prizes

/ 4500 EUR cold cash

/ gadgets, wearables & hardware

/ automatic qualifications to other international CTF competitions

/ trophies & more surprises to come

/ free tickets for DefCamp 2019 for the finalists

SPONSORED BY
HACKING VILLAGE

Other Competitions

Defend the Castle

You know them by name: Ghost, Heartbleed, ShellShock, ImageTragick, StageFright. Vulnerabilities so big that ..

Hack the Bank

Typical attacks on ATMs include sensitive information disclosure and unauthorized money withdrawal. The ..

Car Hacking Village

During the CAR Hacking village, will introduce the basic attack vector which helps the newbies to play CTF. ..
0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS