-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNS Probing Module #11
Comments
Add link to Issue #11 about how to use DNS probing modules.
我想用这个工具,做一些DNS系统的漏洞自测,我发现你论文中提供的test.tudoor.net工具已经不能打开了 我该怎么用这个工具来构造包自测? |
tudoor的数据包构造是在权威服务器侧,这个使用python+scapy就可以了。 |
@idealeer are these also the commands we can use to identify vulnerable DNS resolvers/auths? if not, can you show some examples of these commands? |
before scanning, what types of vulnerable resolvers do you want to find? |
Is there a way to find transparent resolvers using the dns module of xmap? By transparent resolver, I mean a forwarder that returns its upstreams answer to its client without changing the ip source address to its own, i.e. it leaks ingress IP address of its upstream resolver. |
Help
Type
xmap -4 -h -M dnsx -O json
to show the help information.Usage Examples
qq.com A
targeting8.8.8.8
:qq.com A
andbaidu.com NS
targeting8.8.8.8
:domain.txt
targeting all IPs from aip.txt
:Note
: Each line indomain.txt
is in the form likeA,qq.com
and-P domain_number
= the number of domains.The text was updated successfully, but these errors were encountered: