DefCamp Capture the Flag (D-CTF) 2019

DefCamp Capture The Flag ( D-CTF) is the most shattering and rebellious security CTF competition in the Central Eastern Europe.

Here, the most skilled hackers & IT geeks put their knowledge to the test and compete with the best CFT teams from all over the world to get in the shortlist of best top 10, and later on win the overall D-CTF competition or, die trying.

There is one important rule though – hack before being hacked!

What is a Capture the Flag (CTF) event?

Capture the Flag (CTF) is a computer security competition. CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world.

Reverse-engineering, network sniffing, protocol analysis, system administration, programming, and cryptanalysis are all skills which have been required by prior CTF contests.

There are two main styles of capture the flag competitions: attack/defense and jeopardy. In an attack/defense style competition, each team is given a machine (or small network) to defend on an isolated network. Teams are scored on both their success in defending their assigned machine and on their success in attacking other team’s machines.

Depending on the nature of the particular CTF game, teams may either be attempting to take an opponent’s flag from their machine or teams may be attempting to plant their own flag on their opponent’s machine. One of the more prominent attack/defense CTFs is held every year at the hacker conference such as DefCamp where this activity is expected every year.

Goal of the Competition

/ You receive a number of challenges from different categories

/ Your goal is to exploit weaknesses in the systems provided by the organizers or follow hints available in the challenge description about what you need to discover

/ each challenge has an unique flag in the format DCTF{sha256 random message}; if found, you can submit into our platform and get rewarded

Rules of Engagement

/ Teams can have maximum 5 members (including Team Leader)

/ Denial of D-CTF’s infrastructure is forbidden

/ Finding bugs in D-CTF infrastructure can bring more points to the team

/ The most important rule though is hack before getting hacked!

/ Anyone can participate in this competition at the Qualification Phase

/ Best teams will qualify in the final which always happens during DefCamp

/ D-CTF has an online qualifications phase that last for 24 hours and best 10-15 teams from this round will qualify for the finals that will happen in Bucharest, Romania

/ The problems are challenging, unique and contain real life scenarios inspired from latest threats in different fields such as: AI & Machine Learning, Cyber War, Cryptography, Steganography, Web Security, Network Security, Data Forensics, Reverse Engineering, Blockchain, Exploitation, Incident Response and many more.

/ Terms & Condition of the competition are available here.


/ First 3 teams that solve a challenge receive bonus points as follows: 1st place: +30 points, 2nd place: +20 points and 3rd place: +10 points

/ All other teams receive the number of points the challenge has

/ The number of points for any challenge (except Warmup) are computed dynamically based on the number of solvers; this means that the more teams are solving a challenge, the lower the value is

/ if two or more teams are equally at the end of the competition, the differentiation is being computed based on timestamp of the team who reach the score first


/ 4500 EUR cold cash

/ gadgets, wearables & hardware

/ automatic qualifications to other international CTF competitions

/ trophies & more surprises to come

/ free tickets for DefCamp 2019 for the finalists


Other Competitions

Brainpick CTF

In a world where Black Mirror and 1948 are becoming reality, profiling a given person is only a matter of ..

Unlock the SAFE

Back to Contests Unlock the SAFE You have to unlock a SAFE. You know that the lock is radio controlled and ..

Car Hacking Village

During the CAR Hacking village, will introduce the basic attack vector which helps the newbies to play CTF. ..

Sponsors & Partners

They help us make this conference possible.


Orange „brings you closer to what matters to you”.

This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.



Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.


Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.