Nmap dns-service-discovery NSE Script
This page contains detailed information about how to use the dns-service-discovery NSE script. For list of all NSE scripts, visit the Nmap NSE Library.
Script Overview
Script source code: https://github.com/nmap/nmap/tree/master/scripts/dns-service-discovery.nse
Script categories: default, discovery, safe
Target service / protocol: dns, udp
Target network port(s): 5353
List of CVEs: -
Script Description
The dns-service-discovery.nse script attempts to discover target hosts' services using the DNS Service Discovery protocol.
The script first sends a query for _services._dns-sd._udp.local to get a list of services. It then sends a followup query for each one to try to get more information.
Dns-service-discovery NSE Script Arguments
This is a full list of arguments supported by the dns-service-discovery.nse script:
max-newtargetsSets the number of the maximum allowed new targets. If set to 0 or less then there is no limit. The default value is 0.
newtargetsIf specified, lets NSE scripts add new targets.
- - -
To use these script arguments, add them to the Nmap command line using the --script-args arg1=value,[arg2=value,..]
syntax. For example:
nmap --script=dns-service-discovery --script-args max-newtargets=value,newtargets=value <target>
Dns-service-discovery NSE Script Example Usage
Here's an example of how to use the dns-service-discovery.nse script:
nmap --script=dns-service-discovery -p 5353 <target>
Dns-service-discovery NSE Script Example Output
Here's a sample output from the dns-service-discovery.nse script:
PORT STATE SERVICE REASON
5353/udp open zeroconf udp-response
| dns-service-discovery:
| 548/tcp afpovertcp
| model=MacBook5,1
| Address=192.168.0.2 fe80:0:0:0:223:6cff:1234:5678
| 3689/tcp daap
| txtvers=1
| iTSh Version=196609
| MID=0xFB5338C04123456
| Database ID=6FA9761FE123456
| dmv=131078
| Version=196616
| OSsi=0x1F6
| Machine Name=Patrik Karlsson\xE2\x80\x99s Library
| Media Kinds Shared=1
| Machine ID=8945A7123456
| Password=0
|_ Address=192.168.0.2 fe80:0:0:0:223:6cff:1234:5678
Dns-service-discovery NSE Script Example XML Output
There is no sample XML output for this module. However, by providing the -oX <file>
option, Nmap will produce a XML output and save it in the file.xml
file.
Author
- Patrik Karlsson
References
- https://nmap.org/nsedoc/scripts/dns-service-discovery.html
- https://github.com/nmap/nmap/tree/master/scripts/dns-service-discovery.nse
See Also
Related NSE scripts to the dns-service-discovery.nse script:
- dns-blacklist.nse
- dns-brute.nse
- dns-cache-snoop.nse
- dns-check-zone.nse
- dns-client-subnet-scan.nse
- dns-fuzz.nse
- dns-ip6-arpa-scan.nse
- dns-nsec3-enum.nse
- dns-nsec-enum.nse
- dns-nsid.nse
- dns-random-srcport.nse
- dns-random-txid.nse
- dns-recursion.nse
- dns-srv-enum.nse
- dns-update.nse
- dns-zeustracker.nse
- dns-zone-transfer.nse
Visit Nmap NSE Library for more scripts.
Version
This page has been created based on Nmap version 7.92.