Home page logo
/
Zenmap screenshot
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Example Nmap output

File dns-ip6-arpa-scan

Script types: prerule
Categories: intrusive, discovery
Download: http://nmap.org/svn/scripts/dns-ip6-arpa-scan.nse

User Summary

Performs a quick reverse DNS lookup of an IPv6 network using a technique which analyzes DNS server response codes to dramatically reduce the number of queries needed to enumerate large networks.

The technique essentially works by adding an octet to a given IPv6 prefix and resolving it. If the added octet is correct, the server will return NOERROR, if not a NXDOMAIN result is received.

The technique is described in detail on Peter's blog: http://7bits.nl/blog/2012/03/26/finding-v6-hosts-by-efficiently-mapping-ip6-arpa

Script Arguments

prefix

the ip6 prefix to scan

mask

the ip6 mask to start scanning from

Example Usage

nmap --script dns-ip6-arpa-scan --script-args='prefix=2001:0DB8::/48'

Script Output

Pre-scan script results:
| dns-ip6-arpa-scan:
| ip                                 ptr
| 2001:0DB8:0:0:0:0:0:2              resolver1.example.com
|_2001:0DB8:0:0:0:0:0:3              resolver2.example.com

Requires


Author: Patrik Karlsson

License: Same as Nmap--See http://nmap.org/book/man-legal.html

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]