What Is Going On Here

Before jumping in, let me break down the setup because it is a little different.

We have two things to work with:

The thing is, you cannot just Google givemetheflag.com or run a normal DNS lookup and expect to find anything useful. Regular DNS servers out there on the internet have no idea about this domain. Only this specific server at 10.112.180.174 has been configured to know about it, and it is hiding the flag somewhere in its records.

So the goal is simple: point our DNS query directly at that server and ask it what it knows about givemetheflag.com.


Start Digging

When you query a specific DNS server instead of your default one, the dig syntax looks like this:

dig @(dns server ip) example.com (record type)

The @ tells dig to go ask that specific server instead of whatever your system normally uses. So in my case, I will start with an A record query:

dig @10.112.180.174 givemetheflag.com A

I was not expecting to get the flag that fast, but okay.


We Asked for A But Got TXT?

Yeah, a little weird. We asked for an A record, which normally returns an IP address. But the server shot back a TXT record with the flag in it instead.

This is just a misconfigured server doing its own thing, basically set up to dump the TXT record no matter what record type you ask for. Not something you would see in the wild, but it works for a CTF.

The more interesting takeaway is why TXT records are worth checking in real engagements. Companies use them for all kinds of things:

So whenever you are doing recon on a domain, always throw a TXT query in there.

Flag: flag{0767ccd06e79853318f25aeb08ff83e2}