dns-fuzz
脚本使用类型:
portrule
脚本所属分类:
fuzzer, intrusive
脚本下载地址: http://nmap.org/svn/scripts/dns-fuzz.nse
Launches a DNS fuzzing attack against DNS servers.
The script induces errors into randomly generated but valid DNS packets. The packet template that we use includes one uncompressed and one compressed name.
Use the dns-fuzz.timelimit
argument to control how long the
fuzzing lasts. This script should be run for a long time. It will send a
very large quantity of packets and thus it's pretty invasive, so it
should only be used against private DNS servers as part of a software
development lifecycle.
How long to run the fuzz attack. This is a
number followed by a suffix: s
for seconds,
m
for minutes, and h
for hours. Use
0
for an unlimited amount of time. Default:
10m
.
执行格式
nmap --script dns-fuzz --script-args timelimit=2h <target>
Host script results: |_dns-fuzz: Server stopped responding... He's dead, Jim.
Author: Michael Pattrick
License: VER007 整理 http://www.ver007.com