Tags: cry
Rating:
# DragoNflieS
**Event:** Nullcon Goa HackIM 2026 CTF
**Category:** Misc
**Points:** 257
**Service:** `52.59.124.14:5053`
## Overview
The DNS server uses EDNS Client Subnet (ECS) to return different TXT answers for `flag.ctf.nullcon.net` based on the client subnet. By spoofing ECS with the right internal address, the real flag is returned.
## Approach
1. Query without ECS: returns `NOPE`.
2. Add ECS and test private ranges to confirm split-horizon behavior.
3. The winning subnet is `10.13.37.1/32`, which returns the real flag.
## Winning Query
```bash
dig @52.59.124.14 -p 5053 flag.ctf.nullcon.net TXT +subnet=10.13.37.1/32
```
## Flag
`ENO{Whirr_do_not_send_private_data_for_wrong_IP_Whirr}`