<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>DNS Server :: goshs Documentation</title>
    <link>https://goshs.de/en/usage/collaboration/dns/index.html</link>
    <description>How to use goshs as a DNS server goshs includes a lightweight DNS server that logs every incoming DNS query. This is useful in penetration testing and CTF scenarios where you want to detect out-of-band DNS interactions — for example when testing for SSRF, XXE, blind injection, or similar vulnerabilities.&#xA;Tip To receive DNS callbacks from the internet you need a registered domain with an NS delegation record pointing to your server. See Domain setup for the full configuration.</description>
    <generator>Hugo</generator>
    <language>en-US</language>
    <lastBuildDate></lastBuildDate>
    <atom:link href="https://goshs.de/en/usage/collaboration/dns/index.xml" rel="self" type="application/rss+xml" />
  </channel>
</rss>