Privacy controls
CyberFurl can load analytics only after you opt in. Core product features work without analytics consent.
Test whether your DNS zone transfers are properly restricted. DNS zone transfer vulnerabilities expose your complete DNS zone to anyone who asks.
DNS zone transfer (AXFR) is a mechanism for replicating DNS zone data between name servers. It's used by primary and secondary name servers to synchronize zone records. However, when misconfigured, zone transfers can be requested by anyone, not just authorized secondary servers. This exposes the complete DNS zone including all subdomains, mail servers, IP addresses, TXT records, and infrastructure details. Attackers use zone transfers for reconnaissance — mapping your entire network topology from a single DNS query. Every DNS security audit includes zone transfer testing as a fundamental check.
An open zone transfer is a critical information disclosure vulnerability. It reveals your complete DNS infrastructure to attackers, enabling targeted attacks against specific subdomains, services, and IP ranges.
Leaving AXFR open to any IP address, not restricting zone transfers to authorized secondary name servers, using default BIND configurations that allow transfers, and not testing zone transfer restrictions after DNS infrastructure changes.
Type the domain to test for zone transfer vulnerabilities.
We discover the authoritative name servers for the domain.
We attempt a zone transfer (AXFR) request against each name server.
If any server accepts the transfer, we report the vulnerability and exposed records.
Automatically discovers all authoritative name servers for the target domain. Tests each name server individually since zone transfer policies may differ between servers in the same zone.
Attempts DNS zone transfer (AXFR) requests against each discovered name server. Checks both standard and alternative transfer mechanisms that some misconfigured servers may accept.
If a zone transfer succeeds, we enumerate and report all exposed records including A, AAAA, MX, TXT, NS, CNAME, and SOA records. Shows the full scope of the information disclosure.
Tests not just standard AXFR but also IXFR (incremental transfer) and alternative request formats. Some servers may block AXFR but incorrectly allow other transfer types.
If a vulnerability is found, we provide specific remediation steps for common DNS server software including BIND, Microsoft DNS, PowerDNS, and cloud DNS providers.
Distinguishes between genuine zone transfer success and error messages or partial responses that some servers return. Only reports confirmed vulnerabilities with verified data exposure.
Automate zone transfer tests, monitor DNS configuration drift, detect open resolvers, and get alerted when DNS security vulnerabilities are introduced.