Post

Sws101_ctf3

Topic : Dig Dug

alt text

Overview

In the “Dig Dug” room on TryHackMe, the objective is to retrieve a flag from a DNS server by making a special DNS request. This involves using DNS enumeration tools to interact with the server and extract the necessary information.

Step-by-Step Solution

1. Start the Machine

To begin, we need to deploy both the vulnerable machine and the TryHackMe AttackBox. Press the green “Start Machine” button to deploy the DNS server, and the blue “Start AttackBox” button to deploy the AttackBox.

2. Get the IP Address of the VM

Once the machine is up and running, note down the IP address of the target DNS server. This can be found on the TryHackMe interface. In case, the IP address is 10.10.43.202.

3. Understand the Task

We need to make a special request for the domain givemetheflag.com to the DNS server at 10.10.43.202.

4. Perform DNS Enumeration Using nslookup

We start by using nslookup to query the DNS server.

5. Perform DNS Enumeration Using dig

For a more detailed query, we can use the dig command. This command provides more comprehensive details about the DNS response, including additional information that nslookup might not show.

The response from the dig command should include the flag.

Summary

This rooom involves deploying a VM, performing DNS enumeration using nslookup and dig, and analyzing the responses to find the flag. These task not only helps in understanding basic DNS queries but also in recognizing how to handle DNS servers in a penetration testing environment.

This post is licensed under CC BY 4.0 by the author.

Trending Tags