Tags: misc crypto dns 

Rating:

(Author's writeup)

**Goal:**
Find data embedded on the DNS tree

**Tools:**
dig
rot13

**Solution:**
1) Login into b.jetsons.tk
2) Type “dig @a.jetsons.tk judy.jetsons.tk axfr”
3) Focus on the three judy subdomains
4) Type “dig @a.jetsons.tk 43fkc3760c.judy.jetsons.tk axfr”
5) Type “dig @a.jetsons.tk fx90a75b8f.judy.jetsons.tk axfr”
6) Type “dig @a.jetsons.tk k3aaa48adf.judy.jetsons.tk axfr”
7) You will see three TXT records, one in each subdomain.
8) Join "synt{Yr" plus "neaNobh" plus "gQTNf!}".
9) Use rot13.com with: "synt{YrneaNobhgQTNf!}"
10) The result will be the flag.

**Flag: **
flag{LearnAboutDGAs!}

Original writeup (https://cert.rcts.pt/).