Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Zone Transfer

A DNS mechanism that replicates zone data between name servers, which if misconfigured can leak an organization's complete DNS records to attackers.

A DNS zone transfer (AXFR) is a mechanism designed to replicate DNS records from a primary name server to secondary name servers, ensuring that all authoritative servers for a domain have consistent data. When misconfigured to allow transfers to any requesting host, a zone transfer exposes the organization's complete DNS inventory, revealing internal hostnames, IP addresses, mail servers, and other infrastructure details that significantly aid an attacker's reconnaissance efforts.

How It Works

In normal operation, a secondary DNS server initiates a zone transfer by sending an AXFR query to the primary server. The primary server responds with a complete copy of all DNS records in the zone, including A records (hostnames to IPs), MX records (mail servers), CNAME records (aliases), TXT records (various metadata), and SRV records (service locations). This bulk transfer allows the secondary server to serve authoritative responses without maintaining its own independent zone data.

The security issue arises when DNS servers are configured to honor zone transfer requests from any source rather than restricting them to authorized secondary servers. An attacker who can perform a successful zone transfer receives the entire DNS zone file in a single query. This reveals every subdomain the organization has registered, including development servers, staging environments, internal applications, VPN endpoints, and administrative interfaces that may not be publicly linked or easily discoverable through other enumeration methods.

Testing for zone transfer vulnerabilities is straightforward. A simple DNS query requesting an AXFR record type against the target's authoritative name servers will either return the full zone data or be denied. Modern DNS server software defaults to denying unauthorized transfers, but legacy configurations, overlooked servers, and cloud DNS misconfigurations still expose this vulnerability more frequently than expected.

Why It Matters

An unrestricted zone transfer provides an attacker with a complete map of an organization's DNS infrastructure in seconds, revealing attack surface that would otherwise require extensive subdomain enumeration and reconnaissance. Internal hostnames often follow naming conventions that disclose their purpose, such as vpn., admin., staging., or db., allowing attackers to prioritize high-value targets. Security assessments routinely test for zone transfer restrictions as one of the first reconnaissance steps against a target's DNS infrastructure.

Need your application tested? Get in touch.

Related terms

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment