DNS Zone Transfers |
Attack Pattern ID: 291 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Low | Status: Draft |
DNS Zone Transfers |
Attack Pattern ID: 291 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Low | Status: Draft |
Summary
An attacker exploits a DNS misconfiguration that permits a ZONE transfer. Some external DNS servers will return a list of IP address and valid hostnames. Under certain conditions, it may even be possible to obtain Zone data about the organization's internal network. When successful the attacker learns valuable information about the topology of the target organization, including information about particular servers, their role within the IT structure, and possibly information about the operating systems running upon the network. This is configuration dependent behavior so it may also be required to search out multiple DNS servers while attempting to find one with ZONE transfers allowed.
Target Attack Surface Description
Targeted OSI Layers: Application Layer
Target Attack Surface Localities
Target Attack Surface Types: Service
Target Functional Services
Target Functional Service 1: Domain Name Service (DNS) |
---|
A client application capable of interacting with the DNS server or a command-line utility or web application that automates DNS interactions.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 309 | Scanning for Devices, Systems, or Routes | Mechanism of Attack1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.