HOME>>>>>>>>>

File dns-random-srcport

脚本使用类型: portrule
脚本所属分类: external, intrusive
脚本下载地址: http://nmap.org/svn/scripts/dns-random-srcport.nse

User Summary

Checks a DNS server for the predictable-port recursion vulnerability. Predictable source ports can make a DNS server vulnerable to cache poisoning attacks (see CVE-2008-1447).

The script works by querying porttest.dns-oarc.net (see https://www.dns-oarc.net/oarc/services/porttest). Be aware that any targets against which this script is run will be sent to and potentially recorded by one or more DNS servers and the porttest server. In addition your IP address will be sent along with the porttest query to the DNS server running on the target.

Example Usage

执行格式

nmap -sV --script=dns-random-srcport <target>

Script Output

PORT   STATE SERVICE REASON
53/udp open  domain  udp-response
|_dns-random-srcport: X.X.X.X is GREAT: 26 queries in 1.2 seconds from 26 ports with std dev 17905

Requires


Author: Script: Brandon Enright <bmenrigh@ucsd.edu>
porttest.dns-oarc.net: Duane Wessels <wessels@dns-oarc.net>

License: VER007 整理 http://www.ver007.com