Nmap Development mailing list archives

dns-recursion.nse Server Status Opcode 2 where comes from?


From: Yuri Slobodyanyuk <yuri () yurisk info>
Date: Tue, 16 May 2017 16:08:25 +0300

Good day everyone,
I am trying to understand in running this script why does nmap (v7.01) send
on every target as 1st packet  Server Status request (OPCODE 2
https://www.ietf.org/rfc/rfc1035.txt)  ? Running on the same system "dig"
does not produce it.
I am asking because some vendors started blocking scans on this packet
(scanning the same IPs using dig does not get me blocked) and basically
I'd love to disable this feature.
Thanks
cmd: nmap -sU -P0 -p 53 --script=dns-recursion 8.8.8.8
[image: Inline image 1]
-- 
Taking challenges one by one.
http://yurisk.info

_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: