Replies: 1 comment
-
| 
         Just an additional information, it maybe nuclei is doing a dig / nslookup reason why interaction is showing up in my interactsh-client. Seems initiated by Nuclei attackers side but not the target as it is reproducible only using Nuclei.  | 
  
Beta Was this translation helpful? Give feedback.
                  
                    0 replies
                  
                
            
  
    Sign up for free
    to join this conversation on GitHub.
    Already have an account?
    Sign in to comment
  
        
    
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
Good day. Anyone has experience when testing OOB DNS with Nuclei? I hosted my own interactsh server and client. The target is vulnerable to OOB DNS using nuclei tool and configure my hosted interactsh server/client and it is working as I am receiving DNS [d3u70klndrldsdis0ql04xpfjo88h1hdg] Received DNS interaction from xxx.xxx.xx.xxx at 2025-10-25 14:38:12 / [external-service-interaction:word-1] [http] [info] http://xx.xxx.xxx.xx.
Using default Nuclei settings using interactsh server oast.com also works. However replicating it using curl or manual method it doesn't work. Is this false positive?
Thank you
Beta Was this translation helpful? Give feedback.
All reactions