Domain Drip

Description

Someone in the network is whispering secrets.

Can you find it?

Author: Z10UD1

Files

  • domain.pcapng

Flag: Spark{s0m30n3_st4rt3d_t0_und3rst4nd_th1s}

Description: DNS exfiltration via subdomain queries.

Solution: Extract DNS queries to spark.com subdomains, which are Base64-encoded:

import subprocess
import base64

result = subprocess.run(
    ['tshark', '-r', 'domain.pcapng', '-Y', 'dns.qry.name contains "spark.com"', 
     '-T', 'fields', '-e', 'dns.qry.name', '-e', 'frame.number'],
    capture_output=True, text=True
)

queries = []
seen = set()
for line in result.stdout.strip().split('\n'):
    if line and '\t' in line:
        query, frame = line.split('\t')
        subdomain = query.split('.')[0]
        if subdomain != 'end' and subdomain not in seen:
            queries.append((int(frame), subdomain))
            seen.add(subdomain)

queries.sort(key=lambda x: x[0])

b64_string = ''.join([q[1] for q in queries])
decoded = base64.b64decode(b64_string).decode()
print(decoded)  # Spark{s0m30n3_st4rt3d_t0_und3rst4nd_th1s}

Last updated

Was this helpful?