There is a well-known domain intentionally left open for AXFR zone transfers for educational and testing purposes: zonetransfer.me. This domain is often used by security researchers and administrators to demonstrate how AXFR works and to test DNS zone transfer vulnerabilities. You can initiate an AXFR request against its name servers (nsztm1.digi.ninja and nsztm2.digi.ninja) to retrieve the entire zone file, as it is configured to allow such transfers without authentication.
Would you like instructions on how to perform an AXFR request against this domain?
To discover the name servers for a domain like zonetransfer.me, you can use standard DNS lookup tools such as dig, nslookup, or host. Here’s how you could have found the name servers nsztm1.digi.ninja and nsztm2.digi.ninja:
digRun the following command:
bashdig +short ns zonetransfer.me
This will return the authoritative name servers for the domain, which in this case are nsztm1.digi.ninja and nsztm2.digi.ninja.
nslookupYou can also use:
bashnslookup -type=ns zonetransfer.me
This will list the name servers responsible for the domain.
hostAlternatively:
bashhost -t ns zonetransfer.me
This command will also reveal the name servers.
These tools query the DNS system to retrieve the name server (NS) records for the domain, which are publicly available unless the domain owner has taken steps to obscure them. Once you have the name servers, you can attempt an AXFR request to see if zone transfers are allowed.
Would you like a step-by-step guide on how to perform an AXFR request using these name servers?