A beginner-friendly walkthrough of the TryHackMe 'Dig Dug' room focused on DNS enumeration. The challenge involves querying a custom DNS server for the domain givemetheflag.com using the dig tool, which returns a TXT record containing the CTF flag instead of a standard A record. The walkthrough covers initial nmap reconnaissance, direct DNS querying with dig, and confirmation with nslookup.
Table of contents
IntroductionInitial ReconnaissanceGet Death Esther’s stories in your inboxConclusionSort: