nmap - Evasion Lab - Medium - htb
Firewall and IDS/IPS Evasion - Medium Lab
$ sudo nmap --script-help discovery | grep dns
<code>dns</code> script argument).
dns-brute
https://nmap.org/nsedoc/scripts/dns-brute.html
subdomains. With the <code>dns-brute.srv</code> argument, dns-brute will also
dns-cache-snoop
https://nmap.org/nsedoc/scripts/dns-cache-snoop.html
<code>dns-cache-snoop.mode</code> script argument. In
Use the <code>dns-cache-snoop.domains</code> script argument to use a
dns-check-zone
https://nmap.org/nsedoc/scripts/dns-check-zone.html
dns-client-subnet-scan
https://nmap.org/nsedoc/scripts/dns-client-subnet-scan.html
Performs a domain lookup using the edns-client-subnet option which
dns-ip6-arpa-scan
https://nmap.org/nsedoc/scripts/dns-ip6-arpa-scan.html
dns-nsec-enum
https://nmap.org/nsedoc/scripts/dns-nsec-enum.html
<code>dns-nsec3-enum</code>.
dns-nsec3-enum
https://nmap.org/nsedoc/scripts/dns-nsec3-enum.html
<code>unhash</code> from https://dnscurve.org/nsec3walker.html, to
Use the <code>dns-nsec-enum</code> script to handle servers that use NSEC
* https://dnscurve.org/nsec3walker.html
dns-nsid
https://nmap.org/nsedoc/scripts/dns-nsid.html
dns-service-discovery
https://nmap.org/nsedoc/scripts/dns-service-discovery.html
The script first sends a query for _services._dns-sd._udp.local to get a
dns-srv-enum
https://nmap.org/nsedoc/scripts/dns-srv-enum.html
dns-zeustracker
https://nmap.org/nsedoc/scripts/dns-zeustracker.html
* https://zeustracker.abuse.ch/ztdns.php
dns-zone-transfer
https://nmap.org/nsedoc/scripts/dns-zone-transfer.html
<code>dns-zone-transfer.domain</code> script argument. If the query is
arguments in this phase are: <code>dns-zone-transfer.server</code> the
specified. The <code>dns-zone-transfer.port</code> argument is optional
* DNS for rocket scientists: http://www.zytrax.com/books/dns/
* How the AXFR protocol works: http://cr.yp.to/djbdns/axfr-notes.htmlLast updated