NCS Competition 2021 Writeup
  • HHousen National Cyber Scholarship Competition 2021 Writeup
  • Forensics
    • FE02 - 100pts
    • FE03 - 100pts
    • FH01 - 500pts
    • FE04 - 100pts
    • FM01 - 250pts
    • FM02 - 250pts
    • FM03 - 250pts
    • FE01 - 100pts
  • Crypto
    • CM01 - 250pts
    • CM02 - 250pts
    • CX01 - 1000pts
    • CH01 - 500pts
    • CH02 - 500pts
  • Binary
    • BM01 - 250pts
    • BM02 - 250pts
    • BM03 - 250pts
    • BX01 - 1000pts
    • BX02 - 100pts
    • BE01 - 100pts
    • BE02 - 100pts
    • BH01 - 500pts
  • Networking
    • NM01 - 250pts
    • NE01 - 100pts
  • Web
    • WX01 - 1000pts
    • WE01 - 100pts
    • WE02 - 100pts
    • WH01 - 500pts
    • WH02 - 500pts
    • WM01 - 250pts
    • WM02 - 250pts
    • WM03 - 250pts
    • WM04 - 250pts
    • WM05 - 250pts
  • Challenge Name
Powered by GitBook
On this page
  • Briefing
  • Solution
  • Flag

Was this helpful?

Edit on Git
  1. Forensics

FE02 - 100pts

PreviousForensicsNextFE03 - 100pts

Last updated 4 years ago

Was this helpful?

Briefing

We're sure there's a flag at cfta-fe02.allyourbases.co - can you find it?

Solution

  1. The provided domain does not resolve to any server. Therefore, the flag must be somewhere in the DNS records. Note that a second version of the challenge does resolve to an IP address hosting a website.

  2. The flag is in a TXT record. It can be found with dig like so: dig TXT cfta-fe02.allyourbases.co The TXT record has the value flag=unlimited_free_texts.

  3. A public DNS service can be used instead of dig like .

Flag

unlimited_free_texts

Google's public DNS