DNS

nmap dns scripts

───────┬─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
       │ File: DNS.txt
───────┼─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
   1   │ # Nmap 7.92 scan initiated Wed Jul 13 15:09:11 2022 as: nmap --script=dns* -p53 -o DNS.txt 192.168.105.122
   2   │ Nmap scan report for 192.168.105.122
   3   │ Host is up (0.051s latency).
   4   │ 
   5   │ PORT   STATE SERVICE
   6   │ 53/tcp open  domain
   7   │ |_dns-fuzz: Server didn't response to our probe, ca
   n't fuzz
   8   │ |_dns-nsec-enum: Can't determine domain for host 192.168.105.122; use dns-nsec-enum.domains script arg.
   9   │ |_dns-nsec3-enum: Can't determine domain for host 192.168.105.122; use dns-nsec3-enum.domains script arg.
  10   │ 
  11   │ Host script results:
  12   │ |_dns-brute: Can't guess domain of "192.168.105.122"; use dns-brute.domain script argument.
  13   │ | dns-blacklist: 
  14   │ |   SPAM
  15   │ |     l2.apews.org - FAIL
  16   │ |_    list.quorum.to - FAIL
  17   │ 
  18   │ # Nmap done at Wed Jul 13 15:09:24 2022 -- 1 IP address (1 host up) scanned in 12.76 seconds

Last updated