DNS

nmap dns scripts

───────┬─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
       β”‚ File: DNS.txt
───────┼─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
   1   β”‚ # Nmap 7.92 scan initiated Wed Jul 13 15:09:11 2022 as: nmap --script=dns* -p53 -o DNS.txt 192.168.105.122
   2   β”‚ Nmap scan report for 192.168.105.122
   3   β”‚ Host is up (0.051s latency).
   4   β”‚ 
   5   β”‚ PORT   STATE SERVICE
   6   β”‚ 53/tcp open  domain
   7   β”‚ |_dns-fuzz: Server didn't response to our probe, ca
   n't fuzz
   8   β”‚ |_dns-nsec-enum: Can't determine domain for host 192.168.105.122; use dns-nsec-enum.domains script arg.
   9   β”‚ |_dns-nsec3-enum: Can't determine domain for host 192.168.105.122; use dns-nsec3-enum.domains script arg.
  10   β”‚ 
  11   β”‚ Host script results:
  12   β”‚ |_dns-brute: Can't guess domain of "192.168.105.122"; use dns-brute.domain script argument.
  13   β”‚ | dns-blacklist: 
  14   β”‚ |   SPAM
  15   β”‚ |     l2.apews.org - FAIL
  16   β”‚ |_    list.quorum.to - FAIL
  17   β”‚ 
  18   β”‚ # Nmap done at Wed Jul 13 15:09:24 2022 -- 1 IP address (1 host up) scanned in 12.76 seconds

Last updated