DNS Zone Transfer Checker
DNS servers share zones using AXFR protocol. If it's misconfigured, attackers can get all DNS information related to your domain. You can use S4Ee’s DNS vulnerability scanner to scan your DNS zone transfer.
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
5 seconds
Time Interval
2 days
Scan only one
Domain
Toolbox
-
What is DNS ?
DNS (Domain Name System) is a service that translates domain names into IP addresses. Users can easily remember domain names, but he computers understand IP addresses that’s why we need DNS. For example, without this service, you have to type '185.60.216.35' in your browser instead of www.facebook.com to access Facebook. IP - Domain mappings are kept on DNS servers. You can query those matches on s4e.io
There are two types of IP addresses IPv4, and IPv6. IPv4 address looks like these:
8.8.8.8 127.0.0.1 255.255.255.255
IPv6 addressed looks like these (all of them are the same IP):
::ffff:808:808 0:0:0:0:0:ffff:0808:0808 0000:0000:0000:0000:0000:ffff:0808:0808
What is DNS Zone Transfer?
Zone transfer is actually a mechanism to share information between DNS servers. This process uses a protocol called AXFR. With this protocol, ZONE files on a DNS server, containing various DNS information are transferred from one server to another.
AXFR is also used in DNS queries to get zone information. An attacker can make this query to your DNS server. If your DNS server is not configured correctly, it will respond to all the queries regarding your domain name records (a, ns, mx, cname, txt etc.). With DNS zone transfer, attackers can learn all DNS information for your domain (including subdomains).
How to Check DNS Zone Transfer?
To test DNS zone transfer online, use our DNS zone transfer test tool. Write your domain on the form at the top of the page, that's all. If you want to test it yourself, continue reading.
If you are using a Linux or an OS X operating system, open terminal and type dig -t axfr yourdomain.com. If your DNS server allow to transfer zone files, it would look like that:
dig -t axfr s4e.io ;; global options: +cmd s4e.io. 86400 IN SOA ns1.s4e.io. info.s4e.io. 2020040313 s4e.io. 86400 IN A 1.1.1.1 s4e.io. 86400 IN NS ns1.s4e.io. test.s4e.io. 86400 IN A 1.1.1.1 sub.s4e.io. 86400 IN A 8.8.8.8 devel.s4e.io. 86400 IN A 8.8.8.8 other.s4e.io. 86400 IN A 8.8.8.8 mail.s4e.io. 86400 IN A 8.8.8.8 mail2.s4e.io. 86400 IN A 8.8.8.8 www.s4e.io. 86400 IN CNAME s4e.io.