Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.104061
Category:Nmap NSE net
Title:Nmap NSE net: dns-zone-transfer
Summary:Requests a zone transfer (AXFR) from a DNS server.;;The script sends an AXFR query to a DNS server. The domain to query is determined by examining the;name given on the command line, the DNS server's hostname, or it can be specified with the dns-zone-transfer.domain' script argument. If the query is successful all domains and domain;types are returned along with common type specific data (SOA/MX/NS/PTR/A).;;This script can run at different phases of an Nmap scan: * Script Pre-scanning: in this phase the;script will run before any Nmap scan and use the defined DNS server in the arguments. The script;arguments in this phase are:'dns-zone-transfer.server' the DNS server to use, can be a;hostname or an IP address and must be specified. The 'dns-zone-transfer.port' argument is;optional and can be used to specify the DNS server port. * Script scanning: in this phase the script;will run after the other Nmap phases and against an Nmap discovered DNS server. If we don't have the;'true' hostname for the DNS server we cannot determine a likely zone to perform the transfer on.;;SYNTAX:;;dns-zone-transfer.server: DNS server. If set, this argument will;enable the script for the 'Script Pre-scanning phase'.;;dns-zone-transfer.addall: If specified, adds all IP addresses;including private ones onto Nmap scanning queue when the;script argument 'newtargets' is given. The default;behavior is to skip private IPs (non-routable).;;dns-zone-transfer.port: DNS server port, this argument concerns;the 'Script Pre-scanning phase' and it's optional, the default;value is '53'.;;dns-zone-transfer.domain: Domain to transfer.
Description:Summary:
Requests a zone transfer (AXFR) from a DNS server.

The script sends an AXFR query to a DNS server. The domain to query is determined by examining the
name given on the command line, the DNS server's hostname, or it can be specified with the >dns-zone-transfer.domain' script argument. If the query is successful all domains and domain
types are returned along with common type specific data (SOA/MX/NS/PTR/A).

This script can run at different phases of an Nmap scan: * Script Pre-scanning: in this phase the
script will run before any Nmap scan and use the defined DNS server in the arguments. The script
arguments in this phase are:'dns-zone-transfer.server' the DNS server to use, can be a
hostname or an IP address and must be specified. The 'dns-zone-transfer.port' argument is
optional and can be used to specify the DNS server port. * Script scanning: in this phase the script
will run after the other Nmap phases and against an Nmap discovered DNS server. If we don't have the
'true' hostname for the DNS server we cannot determine a likely zone to perform the transfer on.

SYNTAX:

dns-zone-transfer.server: DNS server. If set, this argument will
enable the script for the 'Script Pre-scanning phase'.

dns-zone-transfer.addall: If specified, adds all IP addresses
including private ones onto Nmap scanning queue when the
script argument 'newtargets' is given. The default
behavior is to skip private IPs (non-routable).

dns-zone-transfer.port: DNS server port, this argument concerns
the 'Script Pre-scanning phase' and it's optional, the default
value is '53'.

dns-zone-transfer.domain: Domain to transfer.

CVSS Score:
0.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:N

CopyrightCopyright (C) 2011 NSE-Script: The Nmap Security Scanner; NASL-Wrapper: Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.