Replies: 2 comments 1 reply
-
|
Just an additional information, it maybe nuclei is doing a dig / nslookup reason why interaction is showing up in my interactsh-client. Seems initiated by Nuclei attackers side but not the target as it is reproducible only using Nuclei. |
Beta Was this translation helpful? Give feedback.
-
|
This isn't necessarily a false positive — it depends on the specific template and what's triggering the DNS lookup. Here's how to determine if it's real: Why nuclei detects it but manual curl doesn't:
# Run with -debug to see the full interaction chain
nuclei -u http://target -t template.yaml -interactsh-server your-server -debug
# Check the interaction source IP
# If the DNS query comes from the TARGET's IP = likely real
# If it comes from your resolver or a CDN IP = likely false positive
If the DNS lookup is coming from the target server's IP, it's a true positive. If it's from your own resolver or a third-party, it's a false positive caused by intermediate infrastructure resolving the domain. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
Good day. Anyone has experience when testing OOB DNS with Nuclei? I hosted my own interactsh server and client. The target is vulnerable to OOB DNS using nuclei tool and configure my hosted interactsh server/client and it is working as I am receiving DNS [d3u70klndrldsdis0ql04xpfjo88h1hdg] Received DNS interaction from xxx.xxx.xx.xxx at 2025-10-25 14:38:12 / [external-service-interaction:word-1] [http] [info] http://xx.xxx.xxx.xx.
Using default Nuclei settings using interactsh server oast.com also works. However replicating it using curl or manual method it doesn't work. Is this false positive?
Thank you
Beta Was this translation helpful? Give feedback.
All reactions