Nmap dns-recursion NSE Script
This page contains detailed information about how to use the dns-recursion NSE script. For list of all NSE scripts, visit the Nmap NSE Library.
Script Overview
Script source code: https://github.com/nmap/nmap/tree/master/scripts/dns-recursion.nse
Script categories: default, safe
Target service / protocol: dns, udp
Target network port(s): 53
List of CVEs: -
Script Description
The dns-recursion.nse script checks if a DNS server allows queries for third-party names. It is expected that recursion will be enabled on your own internal nameservers.
Dns-recursion NSE Script Arguments
The dns-recursion.nse script does not have any arguments.
Dns-recursion NSE Script Example Usage
Here's an example of how to use the dns-recursion.nse script:
nmap -sU -p 53 --script=dns-recursion <target>
Dns-recursion NSE Script Example Output
Here's a sample output from the dns-recursion.nse script:
PORT STATE SERVICE REASON
53/udp open domain udp-response
|_dns-recursion: Recursion appears to be enabled
Dns-recursion NSE Script Example XML Output
There is no sample XML output for this module. However, by providing the -oX <file>
option, Nmap will produce a XML output and save it in the file.xml
file.
Author
- Felix Groebert
References
- https://nmap.org/nsedoc/scripts/dns-recursion.html
- https://github.com/nmap/nmap/tree/master/scripts/dns-recursion.nse
See Also
Related NSE scripts to the dns-recursion.nse script:
- dns-blacklist.nse
- dns-brute.nse
- dns-cache-snoop.nse
- dns-check-zone.nse
- dns-client-subnet-scan.nse
- dns-fuzz.nse
- dns-ip6-arpa-scan.nse
- dns-nsec3-enum.nse
- dns-nsec-enum.nse
- dns-nsid.nse
- dns-random-srcport.nse
- dns-random-txid.nse
- dns-service-discovery.nse
- dns-srv-enum.nse
- dns-update.nse
- dns-zeustracker.nse
- dns-zone-transfer.nse
Visit Nmap NSE Library for more scripts.
Version
This page has been created based on Nmap version 7.92.