Nmap dns-recursion NSE Script


This page contains detailed information about how to use the dns-recursion NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/dns-recursion.nse
Script categories: default, safe
Target service / protocol: dns, udp
Target network port(s): 53
List of CVEs: -

Script Description


The dns-recursion.nse script checks if a DNS server allows queries for third-party names. It is expected that recursion will be enabled on your own internal nameservers.

Dns-recursion NSE Script Arguments


The dns-recursion.nse script does not have any arguments.

Dns-recursion NSE Script Example Usage


Here's an example of how to use the dns-recursion.nse script:

nmap -sU -p 53 --script=dns-recursion <target>

Dns-recursion NSE Script Example Output


Here's a sample output from the dns-recursion.nse script:

PORT   STATE SERVICE REASON
53/udp open  domain  udp-response
|_dns-recursion: Recursion appears to be enabled

Dns-recursion NSE Script Example XML Output


There is no sample XML output for this module. However, by providing the -oX <file> option, Nmap will produce a XML output and save it in the file.xml file.

Author


  • Felix Groebert

References


See Also


Related NSE scripts to the dns-recursion.nse script:

Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.