2024 HuntressCTF - TXT Message

2024-10-01

Summary

Author: @JohnHammond

Hmmm, have you seen some of the strange DNS records for the ctf.games domain? One of them sure is odd...

Steps

In the challenge description, the od was a hyperlink to https://en.wikipedia.org/wiki/Od_(Unix). My first assumption was that i’m going to have to use the OD utility to decode the text. I performed an nslookup against the TXT type and received this response:

nslookup -type=txt ctf.games                                                                                                                 
Server:		192.168.240.2
Address:	192.168.240.2#53

Non-authoritative answer:
ctf.games	text = "146 154 141 147 173 061 064 145 060 067 062 146 067 060 065 144 064 065 070 070 062 064 060 061 144 061 064 061 143 065 066 062 146 144 143 060 142 175"

Authoritative answers can be found from:

I spent some time with the od utility, but was unsuccessful in getting the ASCII conversion. Then I tested with CyberChef’s From Octal and got the flag.

For fun, here is an automated approach:

nslookup -type=txt ctf.games | grep text | cut -d "=" -f 2 | tr -d '"' |  awk '{for(i=1;i<=NF;i++) printf("%c", strtonum("0" $i)); print ""}'

Flag: flag{14e072f705d45882401d141c562fdc0b}