Nmap Development mailing list archives
rDNS scanning
From: Corey Chandler <lists () sequestered net>
Date: Fri, 05 Dec 2008 17:55:17 -0800
My apologies for this relatively basic question.If I want to do a reverse DNS scan of a particular network, the best I'm able to come up with is:
Singularity$ nmap -R -sL --dns-servers 10.101.16.4 10.101.0.0/16 Starting Nmap 4.76 ( http://nmap.org ) at 2008-12-05 17:48 PST Host 10.101.0.0 not scanned Host 10.101.0.1 not scanned Host 10.101.0.2 not scanned Host 10.101.0.3 not scanned Host 10.101.0.4 not scanned Host 10.101.0.5 not scanned Host 10.101.0.6 not scanned Host 10.101.0.7 not scanned Host 10.101.0.8 not scanned Host 10.101.0.9 not scanned Host 10.101.0.10 not scannedThis leads to a LOT of lines in the scan-- is there a way to instruct nmap to only return results that have a PTR record?
Thanks in advance... -- Corey "Jay" Chandler _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- rDNS scanning Corey Chandler (Dec 05)
- Re: rDNS scanning doug (Dec 05)