From: Dave Howe (David.Howe@ansgroup.co.uk)
Date: Tue Mar 18 2008 - 14:52:10 EST
Radu Oprisan wrote:
> LordDoskias wrote:
>>>
>> The best thing that I can think if to use the information obtained
>> from the zone transfer. Perhaps some "private" hosts will come up that
>> you can look into? To my mind AXFR transfers should be considered as
>> part of the reconnaissance stage of a pen-test.
>
>
> Actually, they were, a long time ago.
Bearing in mind of course that it is considered an illegal hacking
technique by American courts :)
------------------------------------------------------------------------
This list is sponsored by: Cenzic
Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!
http://www.cenzic.com/downloads
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:28 EDT