While zone transfer is seldom thought of as a large vulnerability, it provides
the potential Internet attacker with a list of targets to choose from. If zone
transfer is correctly disabled, then the next best list of targets we can get is
by performing a dig command on the target DNS server. You may have noticed
in Exhibit 22 that the DNS server field has changed. We have, in fact, changed
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.