Skip to content

Latest commit

 

History

History
24 lines (13 loc) · 880 Bytes

pitfall.md

File metadata and controls

24 lines (13 loc) · 880 Bytes

PITFALL

Category: Misc Concepts: DNS recon, dig

Problem Statement: sylv3on_ was visiting cybercastors island and thought it'd be funny to bury the flag.txt. Can you help us DIG it out? image

Hints None

After hours and hours of making attempts at steganography and running binwalk a million times, the admin revealed on discord that this problem has got nothing to do with stego.

So the all caps DIG caught my attention. I googled and found out it's a DNS recon tool. I used it to find all TXT records(since they mentioned flag.txt) of the CTF website, but no luck.

After some brainstorming, I thought why not dig the official website of cybercastors, and yep there the flag was in a TXT record of the official domain of cybercastors

Command: dig txt cybercastors.com

FLAG: castorsCTF{L00K_1_DuG_uP_4_fL4g_464C4147}