nslookup can perform zone transfers.  Syntax:

c:\>nslookup <domain.com>
  -default server: <corp-dns.domain.com>
  -address: 196.254.0.1
   >ls -d <domain.com>

This will allow a zone transfer (no null session needed) unless (in 2000)
Services and Applications\DNS\[server name]\Forward Lookup
Zones\[zone-name]\properties, then zone transfers tab, "Allow zone
transfers" checked and "to any server" is not radioed.  In NT 4.0, this
function is performed I believe with a registry hack in the DNS services
area, not sure of the specifics, though.

-----Original Message-----
From: Stacy M. Williams [mailto:[EMAIL PROTECTED]]
Sent: Monday, September 10, 2001 6:13 PM
To: '[EMAIL PROTECTED]'; '[EMAIL PROTECTED]';
'[EMAIL PROTECTED]'; '[EMAIL PROTECTED]'
Subject: MS DNS Zone Transfer Exploit


Is anyone aware of a Microsoft DNS Zone Transfer Exploit
that would allow a forced zone transfer within DNS?

Any information available, or security alert on the subject
would be very helpful.

Thanks.

Stacy

----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management
and tracking system please see: http://aris.securityfocus.com


_________________________________________________________
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com

Reply via email to