🐀 0 pts earned

Axferia

A forgotten nameserver sits exposed on the network, its zone transfer restrictions never configured. What secrets does its DNS database hold — and can you leverage them to walk right through the front door?

Limited-Time Machine

Ends in calculating...

Machine online — 52ms (checked 3m ago)
Target IP Log in to reveal
User Flag Pending
Root Flag Pending

Premium

Walkthrough, Tips and Tricks

Walkthrough

Start with DNS recon and test for zone transfer against the target nameserver. Review the transferred records for hostnames, credentials, and environment clues. Use discovered credentials to gain initial shell access, then enumerate local privilege escalation paths. Check misconfigured writable system files and escalate to root safely.

Tips and Tricks

Try AXFR directly against the authoritative server. Parse every record type, not only A records. Store recon output in notes so you can pivot quickly. After foothold, run basic enum before trying random exploits.

Community

Community Walkthroughs

No community walkthroughs yet — be the first!

Log in to submit your own walkthrough.