dns-random-txid
脚本使用类型:
portrule
脚本所属分类:
external, intrusive
脚本下载地址: http://nmap.org/svn/scripts/dns-random-txid.nse
Checks a DNS server for the predictable-TXID DNS recursion vulnerability. Predictable TXID values can make a DNS server vulnerable to cache poisoning attacks (see CVE-2008-1447).
The script works by querying txidtest.dns-oarc.net (see https://www.dns-oarc.net/oarc/services/txidtest). Be aware that any targets against which this script is run will be sent to and potentially recorded by one or more DNS servers and the txidtest server. In addition your IP address will be sent along with the txidtest query to the DNS server running on the target.
执行格式
nmap -sV --script=dns-random-txid <target>
PORT STATE SERVICE REASON 53/udp open domain udp-response |_dns-random-txid: X.X.X.X is GREAT: 27 queries in 61.5 seconds from 27 txids with std dev 20509
Author: Script: Brandon Enright <bmenrigh@ucsd.edu>
txidtest.dns-oarc.net: Duane Wessels <wessels@dns-oarc.net>
License: VER007 整理 http://www.ver007.com