Rating:


<h1>Dig Dug</h1>
Category: Web Warm-up
<h2>Description:</h2>

The pot calling the kettle black.

the link provided https://digx.asisctf.com/ is a static page with image included (dig-tool.jpg)
with a text :
```
If you want to know what is dig, you should consider that dig stands for domain information groper.

Thank you for seeing our digs.
```

so the idea is to use Domain Information Groper (DIG) i used dnsdumpster which an online DNS Digger (service)
```
https://dnsdumpster.com/
```

the querry answer was an url in the A record
![alt text](https://raw.githubusercontent.com/occupe/Writeups-CTF/master/ASIS-CTF/Dig%20Dug/image/f1.PNG)

which is
```
https://airplane.asisctf.com/
```

after visiting the URL we find a simple message :
![alt text](https://raw.githubusercontent.com/occupe/Writeups-CTF/master/ASIS-CTF/Dig%20Dug/image/f2.PNG)

and in the source code we can see a JS file included (but obfuscated)

![alt text](https://raw.githubusercontent.com/occupe/Writeups-CTF/master/ASIS-CTF/Dig%20Dug/image/f3.PNG)

so all we have to do is to decode the JS and we search for ASIS{

and the flag was :
![alt text](https://raw.githubusercontent.com/occupe/Writeups-CTF/master/ASIS-CTF/Dig%20Dug/image/ff.PNG)

Original writeup (https://github.com/occupe/Writeups-CTF/blob/master/ASIS-CTF/Dig%20Dug/Readme.md).