Nmap dns-service-discovery NSE Script


This page contains detailed information about how to use the dns-service-discovery NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/dns-service-discovery.nse
Script categories: default, discovery, safe
Target service / protocol: dns, udp
Target network port(s): 5353
List of CVEs: -

Script Description


The dns-service-discovery.nse script attempts to discover target hosts' services using the DNS Service Discovery protocol.

The script first sends a query for _services._dns-sd._udp.local to get a list of services. It then sends a followup query for each one to try to get more information.

Dns-service-discovery NSE Script Arguments


This is a full list of arguments supported by the dns-service-discovery.nse script:

max-newtargets

Sets the number of the maximum allowed new targets. If set to 0 or less then there is no limit. The default value is 0.

newtargets

If specified, lets NSE scripts add new targets.

- - -
To use these script arguments, add them to the Nmap command line using the --script-args arg1=value,[arg2=value,..] syntax. For example:

nmap --script=dns-service-discovery --script-args max-newtargets=value,newtargets=value <target>

Dns-service-discovery NSE Script Example Usage


Here's an example of how to use the dns-service-discovery.nse script:

nmap --script=dns-service-discovery -p 5353 <target>

Dns-service-discovery NSE Script Example Output


Here's a sample output from the dns-service-discovery.nse script:

PORT     STATE SERVICE  REASON
5353/udp open  zeroconf udp-response
| dns-service-discovery:
|   548/tcp afpovertcp
|     model=MacBook5,1
|     Address=192.168.0.2 fe80:0:0:0:223:6cff:1234:5678
|   3689/tcp daap
|     txtvers=1
|     iTSh Version=196609
|     MID=0xFB5338C04123456
|     Database ID=6FA9761FE123456
|     dmv=131078
|     Version=196616
|     OSsi=0x1F6
|     Machine Name=Patrik Karlsson\xE2\x80\x99s Library
|     Media Kinds Shared=1
|     Machine ID=8945A7123456
|     Password=0
|_    Address=192.168.0.2 fe80:0:0:0:223:6cff:1234:5678

Dns-service-discovery NSE Script Example XML Output


There is no sample XML output for this module. However, by providing the -oX <file> option, Nmap will produce a XML output and save it in the file.xml file.

Author


  • Patrik Karlsson

References


See Also


Related NSE scripts to the dns-service-discovery.nse script:

Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.