Skip to content

NS Record Detection

ID: nameserver-fingerprint

Severity: info

Author: pdteam

Tags: dns,ns

An NS record was detected. An NS record delegates a subdomain to a set of name servers.

id: nameserver-fingerprint
info:
name: NS Record Detection
author: pdteam
severity: info
description: An NS record was detected. An NS record delegates a subdomain to a set of name servers.
classification:
cwe-id: CWE-200
metadata:
max-request: 1
tags: dns,ns
dns:
- name: "{{FQDN}}"
type: NS
matchers:
- type: regex
part: answer
regex:
- "IN\tNS\\t(.+)$"
extractors:
- type: regex
group: 1
regex:
- "IN\tNS\t(.+)"
# digest: 490a0046304402204c8549e5c2a45732f218c404c2f4d49ed740bb91f27dab259f710952fc089496022058f7dc0d477f9b990d5fac516e5aba8552b222b9b4a1dd17491a4011ffa4ad34:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "dns/nameserver-fingerprint.yaml"

View on Github