Want to run this Docker container locally?

docker run -d --restart always -p 9011:53/tcp -p 9011:53/udp -p 9012:80 --name flag-f joshbeck2024/ctf-zone-transfer-flag-f

Important Notes:

This machine has a DNS server that is configured to accept zone transfer requests from anyone on the internet. It was inspired by the 2016 North Korea hack where the North Korean government left some of the their DNS servers in this type of misconfigured state and hackers were able to see the information and name records held within the servers there.

If we go to the IP address of the box in the web browser:

<http://172.25.200.200:9012>

You’ll see we are redirected to box1.beck.hackme. Flag D describes what a redirect like this is and how to handle it. Let’s assume open up /etc/hosts and add an entry for 172.25.200.200 and see if that gets the job done.

pico /etc/hosts

image.png

Once we are at the webpage, if we inspect the source code we’ll see that there is a comment at the bottom

image.png

Here we have another domain name. Let’s add that to /etc/hosts as well.

pico /etc/hosts

image.png

This hint is designed to get you to think: Zone Transfer!

image.png