A beginner-friendly walkthrough of the TryHackMe 'Dig Dug' room focused on DNS enumeration. The challenge involves querying a custom DNS server for the domain givemetheflag.com using the dig tool, which returns a TXT record containing the CTF flag instead of a standard A record. The walkthrough covers initial nmap reconnaissance, direct DNS querying with dig, and confirmation with nslookup.

2m read timeFrom infosecwriteups.com
Post cover image
Table of contents
IntroductionInitial ReconnaissanceGet Death Esther’s stories in your inboxConclusion

Sort: