DNS - zone transfert
- Description: A not really dutiful administrator has set up a DNS service for the "ch11.challenge01.root-me.org" domain...
- Difficulty: Easy
🔎 Solution
The challenge provides details about a DNS service running on a non-standard port, including the host, protocol, and port number. The objective is to interact with a misconfigured DNS server to retrieve the flag.
To begin, I used the dig
command to manually query the DNS server and request all available record types (A, TXT, MX, NS,...):
dig @challenge01.root-me.org -p 54011 ch11.challenge01.root-me.org ANY
The response returned a set of DNS records, and in the ANSWER SECTION, the flag was clearly revealed.
;; ANSWER SECTION:
ch11.challenge01.root-me.org. 604800 IN TXT "DNS transfer secret key : CBkFRwfNMMtRjHY"
ch11.challenge01.root-me.org. 604800 IN SOA ch11.challenge01.root-me.org. root.ch11.challenge01.root-me.org. 2 604800 86400 2419200 604800
ch11.challenge01.root-me.org. 604800 IN NS ch11.challenge01.root-me.org.
ch11.challenge01.root-me.org. 604800 IN A 127.0.0.1
🚩Flag
CBkFRwfNMMtRjHY