DNS
nmap dns scripts
───────┬─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ File: DNS.txt
───────┼─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
1 │ # Nmap 7.92 scan initiated Wed Jul 13 15:09:11 2022 as: nmap --script=dns* -p53 -o DNS.txt 192.168.105.122
2 │ Nmap scan report for 192.168.105.122
3 │ Host is up (0.051s latency).
4 │
5 │ PORT STATE SERVICE
6 │ 53/tcp open domain
7 │ |_dns-fuzz: Server didn't response to our probe, ca
n't fuzz
8 │ |_dns-nsec-enum: Can't determine domain for host 192.168.105.122; use dns-nsec-enum.domains script arg.
9 │ |_dns-nsec3-enum: Can't determine domain for host 192.168.105.122; use dns-nsec3-enum.domains script arg.
10 │
11 │ Host script results:
12 │ |_dns-brute: Can't guess domain of "192.168.105.122"; use dns-brute.domain script argument.
13 │ | dns-blacklist:
14 │ | SPAM
15 │ | l2.apews.org - FAIL
16 │ |_ list.quorum.to - FAIL
17 │
18 │ # Nmap done at Wed Jul 13 15:09:24 2022 -- 1 IP address (1 host up) scanned in 12.76 seconds
Last updated