Retro0908
1 min readSep 3, 2023

--

Dig dug, THM ctf

So this ctf is super simple all we are doing is a very basic dig into a dns server hence the name “dig dug”, We only need a basic nmap scan so we know the port the dns is on.

We just need to use the cli based tool dig here is a brief over view of the tool;

The dig (domain information groper) command is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the queried name server(s). Most DNS administrators use the dig command to troubleshoot DNS problems because of its flexibility, ease of use, and clarity of output. Although dig is normally used with command-line arguments, it also has a batch mode for reading lookup requests from a file. Unlike earlier versions, the BIND9 implementation of dig allows multiple lookups to be issued from the command line. Unless it is told to query a specific name server, the dig command tries each of the servers listed in the /etc/resolv.conf file. If you specify no command line arguments or options, the dig command performs an NS query for “.” (the root).

You can read more here > https://www.ibm.com/docs/en/aix/7.1?topic=d-dig-command

Now back to the ctf,

Our command is: dig “the ip address and port ” givemetheflag.com

And that is it you should have your flag if not switch around the ip addr and givemetheflag.com

--

--