A simple recon challenge where examining DNS records for a domain reveals a TXT record containing the flag
When first looking at this challenge, the description is quite clear about what you need to do: investigate a domain that doesn't seem to have a website or even resolve to an IP address. The key hint was in the title: "Digging for Answers" - this immediately suggests at the use of DNS tools, particularly dig.
Since the domain doesn't resolve to an IP address, You'll need to look beyond the standard A record (which maps domain names to IP addresses). DNS has many different record types that can store various kinds of information, and CTF challenges often hide flags in less common record types.
Start with a basic DNS lookup to confirm what the description said:
nslookup diggingforanswers.chals.mctf.io
As expected, this returns "No answer" - the domain doesn't have an A record pointing to an IP address.
Before jumping to conclusions, it's helpful to understand what other types of DNS records exist and could potentially contain the flag. Here are some of the more common DNS record types:
We start with TXT records for a few reasons:
All of these are perfect indicators of a possible flag for the challenge. We can check easily with the dig command (which is also hinted in the challenge title):
dig diggingforanswers.chals.mctf.io TXT
And it worked! The result showed:
;; ANSWER SECTION:
diggingforanswers.chals.mctf.io. 17 IN TXT "MetaCTF{d1ggy_d1ggy_wh0l3_r3c0rds}"