-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNS Probing Module #11
Comments
idealeer
added a commit
that referenced
this issue
Nov 20, 2022
Add link to Issue #11 about how to use DNS probing modules.
我想用这个工具,做一些DNS系统的漏洞自测,我发现你论文中提供的test.tudoor.net工具已经不能打开了 我该怎么用这个工具来构造包自测? |
tudoor的数据包构造是在权威服务器侧,这个使用python+scapy就可以了。 |
@idealeer are these also the commands we can use to identify vulnerable DNS resolvers/auths? if not, can you show some examples of these commands? |
before scanning, what types of vulnerable resolvers do you want to find? |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Help
Type
xmap -4 -h -M dnsx -O json
to show the help information.Usage Examples
qq.com A
targeting8.8.8.8
:qq.com A
andbaidu.com NS
targeting8.8.8.8
:domain.txt
targeting all IPs from aip.txt
:Note
: Each line indomain.txt
is in the form likeA,qq.com
and-P domain_number
= the number of domains.The text was updated successfully, but these errors were encountered: