Dark Mode
Capec-291 Detail
DNS Zone Transfers
Detailed Software Typical Severity: Low
Parents: 309
Threats: T60 T65 T80 T258 T288 T291 T302 T334 T392 T407
An attacker exploits a DNS misconfiguration that permits a ZONE transfer. Some external DNS servers will return a list of IP address and valid hostnames. Under certain conditions, it may even be possible to obtain Zone data about the organization's internal network. When successful the attacker learns valuable information about the topology of the target organization, including information about particular servers, their role within the IT structure, and possibly information about the operating systems running upon the network. This is configuration dependent behavior so it may also be required to search out multiple DNS servers while attempting to find one with ZONE transfers allowed.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-291 | capec | https://capec.mitre.org/data/definitions/291.html | |
| CWE-200 | cwe | http://cwe.mitre.org/data/definitions/200.html | |
| REF-33 | reference_from_CAPEC | Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions (6th Edition), 2009, McGraw Hill |
Not present
- Access to a DNS server that allows Zone transfers.
- A client application capable of interacting with the DNS server or a command- line utility or web application that automates DNS interactions.
Not present
| Confidentiality |
|---|
| Read Data |
Not present