Rating:
[Original writeup](https://bigpick.github.io/TodayILearned/articles/2020-04/wpictf_writeups#dns_wizard).
We probably need to find some information using the DNS lookup information given challenge name. I started with **dig**, but that did not yield any results. Some googling lead me to try looking specifically for `TXT` type records using dig:
```
dig -t TXT wpictf.xyz
; <<>> DiG 9.10.6 <<>> -t TXT wpictf.xyz
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21821
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;wpictf.xyz. IN TXT
;; ANSWER SECTION:
wpictf.xyz. 300 IN TXT "V1BJezFGMHVuZF9UaDNfRE5TLXJlY29yZH0="
;; Query time: 29 msec
;; SERVER: 192.168.1.1#53(192.168.1.1)
;; WHEN: Fri Apr 17 20:01:48 EDT 2020
;; MSG SIZE rcvd: 88
```
And that definitely looks like some base64 info:
```
echo V1BJezFGMHVuZF9UaDNfRE5TLXJlY29yZH0= | base64 -d
WPI{1F0und_Th3_DNS-record}
```