GCIH Exam QuestionsBrowse all questions from this exam

GCIH Exam - Question 27


In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with many requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Each correct answer represents a complete solution. (Choose all that apply.)

Show Answer
Correct Answer: ABD

In the context of DNS zone transfer enumeration, the tools 'Host', 'Dig', and 'NSLookup' are all capable of performing DNS zone transfers. The 'Host' command can be used to make DNS queries and can attempt zone transfers by specifying certain options. 'Dig' is a flexible DNS querying tool and is widely used for performing zone transfers as well. 'NSLookup' also allows for DNS queries and can be used to attempt zone transfers when used in interactive mode. Therefore, these three tools represent complete solutions for performing DNS zone transfers.

Discussion

1 comment
Sign in to comment
anonyuser
Jan 29, 2024

someone tell me what host is

tp9222
Mar 25, 2024

host command is primarily used to perform DNS lookups, such as resolving domain names to IP addresses or vice versa. While it can be used to query DNS servers, it typically does not support DNS zone transfer functionality directly. Therefore, it is less commonly used for conducting DNS zone transfers compared to tools like Dig and NSLookup, which are specifically designed for such tasks.