DNS Zone Transfer Attack
Last updated
Last updated
Synchronization between the servers involved is realized by zone transfer
Using a secret key rndc-key
,
the default configuration, the servers make sure that they communicate with their own master or slave
The slave fetches the SOA
record of the relevant zone from the master at certain intervals,
the so-called refresh time,
usually one hour
compares the serial numbers
If the serial number of the SOA record of the master is greater than that of the slave, the data sets no longer match.
if box is ubuntu and using dns tcp on port 53
might be susceptible to zone transfer attack
get the name server
Exploit Zone transfer
linux
dig axfr @nsztm1.digi.ninja zonetransfer.me
host -t axfr zonetransfer.me nsztm1.digi.ninja
windows
nslookup -type=axfr zonetransfer.me nsztm1.digi.ninja
ask the dns server to query it self
for zone transfer
example
https://yogesh-verma.medium.com/zone-transfer-attacks-a-practical-guide-to-detection-and-prevention-2e8346d0297e